IDouble / Simple-DLL-InjectionLinks
π§ Simple DLL Injection into a Process with C++ π§
β116Updated last year
Alternatives and similar repositories for Simple-DLL-Injection
Users that are interested in Simple-DLL-Injection are comparing it to the libraries listed below
Sorting:
- π Code to read / write the Process Memory from the Kernel π§β77Updated last year
- π Very Simple Template to read / write Process Memory with C++ π§β63Updated last year
- β205Updated 5 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycallβ161Updated last year
- Library containing Anti-RE and Anti-Debug methods.β109Updated last month
- SetWindowsHookEx Injectorβ165Updated 2 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm aβ¦β177Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousModeβ155Updated 2 years ago
- Compile-time conversion library, from IDA-style string to array (supports wildcarding).β36Updated 2 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inteβ¦β95Updated 2 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.β244Updated 6 years ago
- Lightweight HTTP C++ library / curl wrapper for web scrappers, session emulators, restful applications inspired by Laravel HTTP client / β¦β18Updated last year
- DLL Injector using manual map, written in C++β45Updated 4 years ago
- kernel mode spoofer disk and smbios, socket communicationβ185Updated 2 years ago
- This is a simple project of a driver + usermode.β153Updated 3 years ago
- π΅ EAC - BE / Kernel Driver π΅β88Updated 10 months ago
- Kernel mode to user mode dll injectionβ269Updated 4 years ago
- BattlEye shellcodes testerβ148Updated 3 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6β103Updated 2 years ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howeβ¦β126Updated 9 months ago
- Drawing from kernelmode without any hooksβ164Updated 2 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.β264Updated last year
- Hide function calls to prevent reverse-engineeringβ71Updated 4 years ago
- bypass vmp virtual machine detectβ135Updated 2 years ago
- An incomplete CS:GO internal with a rich SDKβ64Updated last year
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of codβ¦β101Updated 9 months ago
- Manual map shellcode (aka byte array) injectorβ72Updated 6 months ago
- kernel anticheat to test your driver againstβ163Updated last week
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calliβ¦β175Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly calledβ82Updated 3 years ago