InoriJam / DLL-hijack-X64Links
This is a python script to generate a hijacked dll to do whatever you want
☆19Updated 5 years ago
Alternatives and similar repositories for DLL-hijack-X64
Users that are interested in DLL-hijack-X64 are comparing it to the libraries listed below
Sorting:
- Add export function and convert exe to dll☆25Updated 4 years ago
- RPC Monitor based on The ETW Microsoft-Windows-Rpc provider☆24Updated 5 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Updated 2 years ago
- ☆51Updated 2 weeks ago
- ☆17Updated 3 years ago
- Think APIMonitor, but for .NET binaries.☆57Updated 2 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆72Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆48Updated 4 months ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆45Updated 7 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- A template to hijack version.dll.☆30Updated 8 years ago
- Windows user mode anti-cheat.☆16Updated 3 months ago
- ☆10Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆41Updated 4 months ago
- x86/x64 dll injector☆30Updated 3 years ago
- 记录一下Windows下的Hook技巧☆14Updated 11 months ago
- This is another tool helping to generate c file for dll hijack, besides AheadLib and AddExport. 这是 AheadLib 和 AddExport 之外的,另一种生成 DLL 劫持…☆28Updated 6 years ago
- Add a new section in the PE file, and copy old import descriptor to the new section then insert a new dll file into the import directory.☆9Updated 3 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆36Updated 6 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆161Updated 4 years ago
- c++ implementation of windows heavens gate☆68Updated 4 years ago
- ☆33Updated 3 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Read Memory without ReadProcessMemory for Current Process☆76Updated 3 years ago
- Miscellaneous Code and Docs☆81Updated last year
- ☆36Updated 3 years ago