Flawww / WoW64InjectionLinks
Proof of concept for injecting a 64-bit DLL into a 32-bit application
☆43Updated 2 years ago
Alternatives and similar repositories for WoW64Injection
Users that are interested in WoW64Injection are comparing it to the libraries listed below
Sorting:
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆95Updated 4 months ago
- driver that communicates using a shared section☆80Updated 9 months ago
- A bunch of architectural headers for i386 and AMD64☆41Updated 2 years ago
- A debugger library using VEH.☆66Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆73Updated 4 years ago
- InfinityHookProMax: Make InfinityHook great great again☆49Updated 2 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆57Updated 10 months ago
- Kernel ReClassEx☆65Updated 2 years ago
- Simple and lightweight hypervisor for AMD processors☆43Updated 2 months ago
- Windows PDB parser for kernel-mode environment.☆103Updated 6 months ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Updated 2 years ago
- modern c++ wrapper around the microsoft portable executable file format☆33Updated last month
- Another wow64ext to try to be compatible with WOW64 for all architectures.☆98Updated 5 months ago
- X86/X64 Hardware Breakpoint Manager☆42Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Updated 6 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- Binary rewriter for 64-bit PE files.☆92Updated last year
- ☆51Updated 4 years ago
- ☆73Updated 3 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆58Updated 3 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 7 years ago
- ☆89Updated 2 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆49Updated 3 months ago
- PoC kernel to usermode injection☆94Updated last year
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆111Updated 5 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Updated 6 years ago
- Binary DisASseMbler☆24Updated 3 years ago
- Load vulnerable drivers using iqvw64e.sys hijack☆34Updated last year
- Hypervisor-based debugger for AMD processors☆61Updated last year