Process Doppelgänging
☆162Dec 19, 2017Updated 8 years ago
Alternatives and similar repositories for Inject-dll-by-Process-Doppelganging
Users that are interested in Inject-dll-by-Process-Doppelganging are comparing it to the libraries listed below
Sorting:
- An attempt at Process Doppelgänging☆183Dec 21, 2017Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, doc…☆72Sep 5, 2020Updated 5 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆638Aug 30, 2022Updated 3 years ago
- ☆27May 27, 2017Updated 8 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Oct 23, 2018Updated 7 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆229Mar 22, 2023Updated 2 years ago
- x86/x64 manual mapping injector using the JUCE library☆89Jun 29, 2020Updated 5 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument…☆15Mar 4, 2018Updated 8 years ago
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- A quick-and-dirty anti-hook library proof of concept.☆105Aug 29, 2018Updated 7 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- A hypervisor hiding user-mode memory using EPT☆107Jan 28, 2018Updated 8 years ago
- Inject code into a legitimate process☆146Dec 9, 2014Updated 11 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- A collection of injection via vc++ in ring3☆243Apr 3, 2017Updated 8 years ago
- ☆125May 23, 2020Updated 5 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Universal Unhooking☆326Sep 19, 2018Updated 7 years ago