DanielKoren / mazrek
just another windows dll loader with fancy gui, compatible both for 64 and 32 bit proccesses. (tested from windows 7 to 10)
☆13Updated 5 years ago
Alternatives and similar repositories for mazrek:
Users that are interested in mazrek are comparing it to the libraries listed below
- Small class to help perform syscalls.☆21Updated last year
- Visual Studio Solution Archiver☆17Updated last year
- External cheat base with DirectX overlay☆20Updated 6 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 5 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Updated 6 years ago
- zInjector is a simple tool for injecting dynamic link libraries into arbitrary processes☆22Updated last year
- Remote memory library in C++17.☆31Updated 6 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆22Updated 4 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- windows kernel deriver loader(pro)☆46Updated 4 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- Uses a driver to read/write process memory☆12Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- Use the Cheat Engine driver in your own process!☆22Updated 6 years ago
- ntos internals☆21Updated 5 years ago
- Visual Studio 2019 extension for building C/C++ projects with the LLVM Compiler Toolchain (installed separately).☆13Updated 3 years ago
- GUI Kernel driver process protect tool☆36Updated 6 years ago
- Injector with kernel power☆16Updated 4 years ago
- Easy DWM switcher without Winlogon suspension☆18Updated last year
- ☆49Updated 6 years ago
- Mono process injector☆22Updated 6 years ago
- Disable threat tracing from the kernel..☆13Updated 3 years ago
- Microsoft Redistributable Download & Installer☆17Updated 5 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- Memory Guard Library☆11Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- ☆9Updated 11 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆22Updated 7 years ago
- easy to use vtable hook with RTTI support☆23Updated 5 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago