Fatmike-GH / DLLInjectionDetectorLinks
A DLL Injection Detector for Windows.
☆76Updated 3 months ago
Alternatives and similar repositories for DLLInjectionDetector
Users that are interested in DLLInjectionDetector are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- monitors hidden syscalls called from call of duty anticheat☆89Updated last year
- kernel-mode DLL Injector☆125Updated 9 months ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆51Updated 2 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆96Updated 10 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆244Updated 3 months ago
- Code samples that serve as references for Windows API functions☆76Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Updated 7 months ago
- Various Process Injection Techniques☆163Updated 3 years ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆68Updated last week
- Small tool to convert beteween the PE alignments (raw and virtual).☆111Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago
- Finding Truth in the Shadows☆120Updated 3 years ago
- spoof return address☆79Updated 2 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆116Updated 4 years ago
- A dynamic unpacking tool☆145Updated 2 years ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆116Updated 3 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆300Updated 2 months ago
- vm_str.hpp is a header only string obfuscator.☆103Updated 5 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆293Updated last month
- Simple API Hooks detector☆77Updated 3 years ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆213Updated 5 months ago
- Load dll with undocumented functions and debug symbols☆47Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆130Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆158Updated 2 years ago
- Virtual Trust Level (VTL 1) secure call tracing☆86Updated 5 months ago
- An x86-64 code virtualizer for VM based obfuscation☆171Updated last year
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆94Updated 3 months ago