ChadSki / SharpNeedle
Inject C# code into a running process
☆335Updated last year
Alternatives and similar repositories for SharpNeedle:
Users that are interested in SharpNeedle are comparing it to the libraries listed below
- Injects C# EXE or DLL Assembly into every CLR runtime and AppDomain of another process.☆229Updated 6 years ago
- A library that simplifies intercepting application function calls using managed code and the .NET Core runtime☆263Updated last year
- A lightweight native DLL mapping library that supports mapping directly from memory☆589Updated last year
- SharpDisasm - x86 / x86-64 disassembler for .NET☆214Updated 5 years ago
- A C# based memory editing library targeting Windows applications, offering various functions to extract and inject data and codes into re…☆644Updated 2 years ago
- Hook native API with C#☆184Updated last year
- .NET anti-managed debugger and anti-profiler code☆298Updated 10 years ago
- Free deobfuscator for ConfuserEx.☆407Updated 4 years ago
- Virtualization made for .NET using ConfuserEX☆268Updated 6 years ago
- An Obfuscator for .NET assembly☆253Updated 6 years ago
- .NET Patcher library using dnlib☆315Updated 4 years ago
- .NET runtime inspector☆268Updated 5 years ago
- Portable Executable (PE) library written in .Net☆599Updated 3 weeks ago
- dll injection tool that implements various methods☆489Updated 12 years ago
- Deviare In Process Instrumentation Engine☆335Updated 4 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆309Updated 7 years ago
- A C# class library for interacting with processes.☆335Updated 3 years ago
- Code that allows running another windows PE in the same address space as the host process.☆434Updated 8 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆322Updated 7 years ago
- Automatically exported from code.google.com/p/simple-assembly-exploror☆249Updated 9 years ago
- Executable that mutates its own code☆370Updated last month
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,078Updated 5 years ago
- C# Kernel Mode Driver to read and write memory in protected processes☆362Updated last year
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆318Updated 7 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆414Updated 5 years ago
- In-Memory PE Loader☆370Updated 5 years ago
- Detours with just single dependency - NTDLL☆617Updated 2 years ago
- Deviare API Hook☆452Updated 5 years ago
- Extended Process Monitor-like tool based on Event Tracing for Windows☆464Updated 5 years ago