3gstudent / Inject-dll-by-APCView external linksLinks
Asynchronous Procedure Calls
☆238Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for Inject-dll-by-APC
Users that are interested in Inject-dll-by-APC are comparing it to the libraries listed below
Sorting:
- Using Driver Global Injection dll, it can hide DLL modules☆536Jun 28, 2019Updated 6 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,269May 1, 2024Updated last year
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆421Sep 9, 2018Updated 7 years ago
- Process Doppelgänging☆162Dec 19, 2017Updated 8 years ago
- System call hook for Windows 10 20H1☆496Jun 26, 2021Updated 4 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager☆696Mar 26, 2019Updated 6 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,272Apr 1, 2024Updated last year
- Reflective PE loader for DLL injection☆186Oct 12, 2017Updated 8 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆341Jul 30, 2017Updated 8 years ago
- Protected Processes Light Killer☆979Mar 24, 2023Updated 2 years ago
- Just another Windows Process Injection☆408Aug 7, 2020Updated 5 years ago
- PE(compressed dll) memory loader using nt api☆46Jul 3, 2017Updated 8 years ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆620Feb 22, 2019Updated 6 years ago
- Hide Driver By MiProcessLoaderEntry☆294May 17, 2019Updated 6 years ago
- Kernel LdrLoadDll injector☆264Oct 6, 2018Updated 7 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- Post-exploitation tool for hiding processes from monitoring applications☆746Jun 18, 2023Updated 2 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- ☆185May 5, 2019Updated 6 years ago
- 💉 DLL/Shellcode injection techniques☆716Mar 26, 2019Updated 6 years ago
- Process Hollowing (Malware Technique)☆1,390Oct 1, 2025Updated 4 months ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆473Dec 21, 2019Updated 6 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆901Nov 21, 2019Updated 6 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,352Jan 22, 2022Updated 4 years ago
- Windows NT Syscall tables☆1,384Dec 31, 2025Updated last month
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆228Mar 22, 2023Updated 2 years ago
- Windows NT x64 syscall fuzzer☆632Jan 11, 2026Updated last month
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆342Apr 27, 2020Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- C++17 PE manualmapper☆431Oct 2, 2021Updated 4 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- Simple Kernelmode DLL Injector with Manual mapping☆335Nov 29, 2023Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago