Hijack a dll in a process to do something.
☆14Aug 21, 2020Updated 5 years ago
Alternatives and similar repositories for DllHijack
Users that are interested in DllHijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago
- One day in 2009 I decided to write a chess program. Just for fun - to see what can it do.☆12Apr 9, 2021Updated 4 years ago
- VCL-based UI components for system tools that use NtUtilsLibrary☆21Mar 4, 2026Updated 2 weeks ago
- ☆14Apr 7, 2018Updated 7 years ago
- WoW 1.12.1 Various hacks and example code☆11Oct 23, 2018Updated 7 years ago
- Multimodal non-rigid boundary based registration☆15Aug 13, 2016Updated 9 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Basicly Guys This Is A 2 Months Old Driverless Fully Undetected Eac And Be Spoofer Source By Hopesar#1338 It Uses Amidewin Etc To Spoof R…☆11Aug 16, 2022Updated 3 years ago
- Visual C++ and Direct2D version of the classic Tetris game☆12Jul 31, 2020Updated 5 years ago
- ☆10Dec 26, 2021Updated 4 years ago
- PSV 碧之轨迹EVO 汉化程序源码☆18Oct 22, 2019Updated 6 years ago
- A Kernel driver for using against anti cheats like EAC or BE☆15Aug 10, 2021Updated 4 years ago
- A customizable awakebot by greyb1t☆14Aug 24, 2020Updated 5 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆45Apr 1, 2023Updated 2 years ago
- Learning Various Process Injection Techniques☆17Apr 4, 2019Updated 6 years ago
- A utility designed to investigate the behavior of the Windows api 'SetWindowsHookEx', and the behavior of the system when installing / ca…☆27Sep 28, 2023Updated 2 years ago
- Not a wow bot!☆23Oct 1, 2012Updated 13 years ago
- Algorithms for detecting trends in time-series data.☆22Sep 6, 2022Updated 3 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Simple .Net hooking library☆31Jan 19, 2017Updated 9 years ago
- [ICIP 2016] A MATLAB implementation of the texture segmentation method in paper: "A factorization based active contour model for texture …☆20Oct 25, 2019Updated 6 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Helper functions for calculating the authenticode digest for a portable executable file☆21Apr 30, 2020Updated 5 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Make patterns for stuff in IDA 7.00☆24Dec 15, 2021Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Prevent the computer from sleeping and dimming the display through a small widget.☆12May 15, 2018Updated 7 years ago
- hook detector☆31Nov 4, 2021Updated 4 years ago
- Example of how to trace mmap page faults in linux☆20Mar 15, 2022Updated 4 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Jun 30, 2013Updated 12 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Hardware performance counter tool for Windows OS☆18Sep 4, 2018Updated 7 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago