A library with four different methods to execute shellcode in a process
☆26Mar 24, 2020Updated 5 years ago
Alternatives and similar repositories for StartRoutine
Users that are interested in StartRoutine are comparing it to the libraries listed below
Sorting:
- A class to gather information about a process, its threads and modules.☆23Mar 23, 2020Updated 5 years ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆16Mar 23, 2020Updated 5 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Collection of shellcode injection and execution techniques☆18Aug 21, 2025Updated 6 months ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- a ntdll.h head file which download from network, and fix all found problems by me.☆33Dec 31, 2024Updated last year
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Apr 1, 2023Updated 2 years ago
- ☆15Oct 24, 2020Updated 5 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- WoW client modification to record client and server packets☆12Jan 7, 2016Updated 10 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Kernel-Mode driver and User-Mode application communication project☆12Jun 24, 2018Updated 7 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- A simple example on how to initiate a direct syscall on WoW64☆12Feb 2, 2018Updated 8 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 6 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- manual mapping injector☆29Sep 28, 2025Updated 5 months ago
- A wrapper class to hide the original calling address of a function☆54Aug 9, 2020Updated 5 years ago
- Modern x64 anti-debug library☆10Oct 29, 2019Updated 6 years ago
- ☆12Aug 28, 2017Updated 8 years ago
- Uses a driver to read/write process memory☆14Oct 1, 2020Updated 5 years ago
- Win32 API Hook偵測☆10Oct 1, 2017Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- 绕过火绒剑检测的一个简单的inlinehook方法☆12Mar 10, 2019Updated 6 years ago