Dos98 / ProcessInjectionTechniques
Learning Various Process Injection Techniques
☆21Updated 5 years ago
Alternatives and similar repositories for ProcessInjectionTechniques:
Users that are interested in ProcessInjectionTechniques are comparing it to the libraries listed below
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated last year
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Dump mapped PE files from memory to the disk☆18Updated 5 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆27Updated 3 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- Library for using direct system calls☆35Updated 4 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- x86/x64 dll injector☆29Updated 2 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Remote memory library in C++17.☆30Updated 6 years ago
- Static library and headers for linking your software with ntdll.dll☆31Updated 5 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 4 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆31Updated 6 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆24Updated 6 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆31Updated 5 years ago
- ☆23Updated 4 years ago
- R3劫持所有异常☆14Updated 4 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- Remote PE reflective injection with a simple reflective loader☆30Updated 5 years ago
- x64 Windows privilege elevation using anycall☆20Updated 3 years ago
- win32/x64 obfuscate framework☆32Updated 5 years ago
- A library with four different methods to execute shellcode in a process☆24Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Code Integrity Violation Spotter☆17Updated 7 months ago
- Example for PagedOut!☆24Updated 5 years ago
- An implementation of the Process Hollowing technique.☆16Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆36Updated 6 years ago