3gstudent / Inject-dll-by-APC
Asynchronous Procedure Calls
☆214Updated 3 years ago
Alternatives and similar repositories for Inject-dll-by-APC:
Users that are interested in Inject-dll-by-APC are comparing it to the libraries listed below
- Kernel LdrLoadDll injector☆258Updated 6 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆265Updated 2 years ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- Manual DLL Injector using Thread Hijacking.☆233Updated 7 years ago
- A more stealthy variant of "DLL hollowing"☆337Updated 11 months ago
- System call hook for Windows 10 20H1☆486Updated 3 years ago
- A modern c++ implementation of windows heavens gate☆214Updated 4 years ago
- Analyze patches in a process☆249Updated 3 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆384Updated 3 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆241Updated 2 weeks ago
- ☆153Updated 5 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆201Updated 3 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆415Updated 6 years ago
- Hide Driver By MiProcessLoaderEntry☆285Updated 5 years ago
- Research on Windows Kernel Executive Callback Objects☆284Updated 4 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆172Updated 7 years ago
- Load your driver like win32k.sys☆252Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- This is a collection of interesting codes about Windows Process creation.☆231Updated last year
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆262Updated 2 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆527Updated last month
- Easy Anti PatchGuard☆216Updated 3 years ago
- Windows inline hooking tool.☆246Updated 6 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆193Updated 2 years ago
- Vectored Exception Handling Hooking Class☆148Updated 6 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆277Updated 4 years ago
- Hide codes/data in the kernel address space.☆188Updated 3 years ago
- APC Internals Research Code☆161Updated 4 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆586Updated 5 years ago
- C++17 PE manualmapper☆318Updated 3 years ago