A library with four different methods to execute shellcode in a process
☆26Mar 24, 2020Updated 5 years ago
Alternatives and similar repositories for StartRoutine
Users that are interested in StartRoutine are comparing it to the libraries listed below
Sorting:
- A class to gather information about a process, its threads and modules.☆23Mar 23, 2020Updated 5 years ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆16Mar 23, 2020Updated 5 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- Collection of shellcode injection and execution techniques☆18Updated this week
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆45Apr 1, 2023Updated 2 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Kernel-Mode driver and User-Mode application communication project☆12Jun 24, 2018Updated 7 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆35Jul 19, 2021Updated 4 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- ☆17Dec 18, 2020Updated 5 years ago
- A wrapper class to hide the original calling address of a function☆55Aug 9, 2020Updated 5 years ago
- a ntdll.h head file which download from network, and fix all found problems by me.☆34Dec 31, 2024Updated last year
- A simple kernel-level plugin for ReClass.NET☆37May 15, 2018Updated 7 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆393Jul 6, 2022Updated 3 years ago
- A collection of Windows Components(Mostly is ntoskrnl.exe)☆31Nov 16, 2020Updated 5 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- ASLR Disabler (x86 / x64) - Little utility for disabling the ASLR on PE files☆16Aug 1, 2023Updated 2 years ago
- ☆53Dec 21, 2022Updated 3 years ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- A Kernel driver for using against anti cheats like EAC or BE☆15Aug 10, 2021Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- Macro-header for compile-time C obfuscation (tcc, win x86/x64)☆13Aug 4, 2025Updated 7 months ago
- WoW client modification to record client and server packets☆12Jan 7, 2016Updated 10 years ago
- manual mapping injector☆29Sep 28, 2025Updated 5 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Render via steamoverlay externally☆15May 3, 2023Updated 2 years ago