360trev / PELoadFromRamLinks
Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibility to dynamically link code from many sources including realtime download from the web and also code signing!
☆21Updated 12 years ago
Alternatives and similar repositories for PELoadFromRam
Users that are interested in PELoadFromRam are comparing it to the libraries listed below
Sorting:
- Kernel (Ring0) - SSDT unhook driver☆14Updated 7 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆11Updated 12 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- eyuyan image rebuild tools source code☆13Updated 8 years ago
- Sample debugger for x86 and x64☆4Updated 2 years ago
- ☆14Updated 10 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- metasploit loader with antivirus bypass module☆17Updated 9 years ago
- Framework complet d'analyse de malware☆12Updated 9 years ago
- A tool similar to netcat, but tunneled over DNS☆18Updated 8 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 12 years ago
- C++ Code Injector Class☆22Updated 4 years ago
- Anti-Anti-Debugger Plugins☆19Updated 11 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 11 years ago
- Lists work items being queued currently.☆14Updated 10 years ago
- windows kernel File redirection☆20Updated 10 years ago
- ☆14Updated 8 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- ☆25Updated 4 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Windows inject☆16Updated 7 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Zerokit shared code☆17Updated 6 years ago
- Final Transparent encrypted version☆14Updated 8 years ago
- this is a small example for NDIS Firewall☆25Updated 9 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago