Asynchronous Procedure Calls
☆238Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for Inject-dll-by-APC
Users that are interested in Inject-dll-by-APC are comparing it to the libraries listed below
Sorting:
- Using Driver Global Injection dll, it can hide DLL modules☆537Jun 28, 2019Updated 6 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,272May 1, 2024Updated last year
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆421Sep 9, 2018Updated 7 years ago
- Process Doppelgänging☆162Dec 19, 2017Updated 8 years ago
- System call hook for Windows 10 20H1☆497Jun 26, 2021Updated 4 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager☆696Mar 26, 2019Updated 6 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆241Nov 6, 2019Updated 6 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,282Feb 14, 2026Updated 3 weeks ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆341Jul 30, 2017Updated 8 years ago
- Protected Processes Light Killer☆979Mar 24, 2023Updated 2 years ago
- Just another Windows Process Injection☆409Aug 7, 2020Updated 5 years ago
- PE(compressed dll) memory loader using nt api☆46Jul 3, 2017Updated 8 years ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆623Feb 22, 2019Updated 7 years ago
- Hide Driver By MiProcessLoaderEntry☆293May 17, 2019Updated 6 years ago
- Kernel LdrLoadDll injector☆264Oct 6, 2018Updated 7 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- Post-exploitation tool for hiding processes from monitoring applications☆746Jun 18, 2023Updated 2 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- ☆185May 5, 2019Updated 6 years ago
- 💉 DLL/Shellcode injection techniques☆714Mar 26, 2019Updated 6 years ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆476Dec 21, 2019Updated 6 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆905Nov 21, 2019Updated 6 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,356Jan 22, 2022Updated 4 years ago
- Windows NT Syscall tables☆1,393Dec 31, 2025Updated 2 months ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆229Mar 22, 2023Updated 2 years ago
- Windows NT x64 syscall fuzzer☆633Feb 19, 2026Updated 2 weeks ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆345Apr 27, 2020Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- C++17 PE manualmapper☆437Oct 2, 2021Updated 4 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- Simple Kernelmode DLL Injector with Manual mapping☆337Nov 29, 2023Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆1,000Jan 17, 2023Updated 3 years ago