AzureGreen / InjectCollectionLinks
A collection of injection via vc++ in ring3
☆242Updated 8 years ago
Alternatives and similar repositories for InjectCollection
Users that are interested in InjectCollection are comparing it to the libraries listed below
Sorting:
- Hide Driver By MiProcessLoaderEntry☆285Updated 6 years ago
- Asynchronous Procedure Calls☆230Updated 4 years ago
- modify from memorymodule. support exception☆219Updated 4 years ago
- Some ways to inject a DLL into a alive process☆361Updated 7 years ago
- pseudo-code to show how to disable patchguard with win10☆295Updated 7 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆524Updated 5 years ago
- Fast Conversion Windows Dynamic Link Library To ShellCode☆397Updated 3 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆552Updated last year
- Reflective PE loader for DLL injection☆175Updated 7 years ago
- VMProtect 3.x Anti-debug Method Improved☆591Updated 6 years ago
- InfinityHookPro Win7 -> Win11 latest☆526Updated 2 years ago
- Windows Ark 工具的工程和一些demo☆191Updated 9 years ago
- System call hook for Windows 10 20H1☆493Updated 3 years ago
- Manual DLL Injector using Thread Hijacking.☆237Updated 7 years ago
- KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK☆505Updated 2 years ago
- Process Doppelgänging☆157Updated 7 years ago
- In-Memory PE Loader☆376Updated 5 years ago
- Kernel LdrLoadDll injector☆260Updated 6 years ago
- Detours with just single dependency - NTDLL☆644Updated 2 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆324Updated 7 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆149Updated 5 years ago
- LLVM Obfuscator / constexpr / PEB CALL API☆177Updated 6 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆245Updated 4 months ago
- 💉 全能进程注入器 [Yet Another Process Injector] that reduce differences between x64, wow64 and x86 processes.☆282Updated 2 years ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager☆676Updated 6 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆322Updated 2 years ago
- PatchGuard Research☆301Updated 6 years ago
- AntiDebugging sample sources written in C++☆340Updated 6 years ago
- Elevate a process to be a protected process☆150Updated 5 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆417Updated 6 years ago