ZwProcessHollowing
Orca
ZwProcessHollowing | Orca | |
---|---|---|
1 | 7 | |
75 | 183 | |
- | - | |
1.8 | 0.0 | |
about 1 year ago | over 2 years ago | |
C++ | C++ | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ZwProcessHollowing
Orca
What are some alternatives?
inline_syscall - Inline syscalls made easy for windows on clang
al-khaser - Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Black-Angel-Rootkit - Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
UBoat - HTTP Botnet
syser - syser debugger x32/x64 ring3 with source level debugging/watch view/struct view
adduser-dll - Simple DLL that add a user to the local Administrators group
Corth - It's like Porth, but in C++. Yep, we're going full circle.
juicy-potato - A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.