EternityX / zInjectorLinks
zInjector is a simple tool for injecting dynamic link libraries into arbitrary processes
☆22Updated last year
Alternatives and similar repositories for zInjector
Users that are interested in zInjector are comparing it to the libraries listed below
Sorting:
- ☆27Updated 7 years ago
- ☆36Updated 6 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- APEX-EACBypass(usermode)☆47Updated 6 years ago
- ☆18Updated 4 years ago
- ☆36Updated 5 years ago
- ☆50Updated 6 years ago
- Modify process handle permissions☆60Updated 8 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆51Updated 4 years ago
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- BitBlt color aimbot☆16Updated 6 years ago
- Memory Guard Library☆11Updated 4 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- Mono process injector☆22Updated 6 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆76Updated 6 years ago
- ☆17Updated 2 years ago
- simply manual map any system image☆18Updated 4 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- ☆100Updated last year
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆82Updated 6 years ago
- ☆28Updated 4 years ago
- using gpuz to load driver☆35Updated 6 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 7 years ago
- APC注入DLL内核层☆25Updated 6 years ago
- Simulate SendInput with ClassService☆33Updated 6 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆48Updated 4 years ago
- ☆47Updated 4 years ago
- windows kernel deriver loader(pro)☆47Updated 4 years ago
- ☆15Updated 4 years ago