LakshmiDesai / LoadPELinks
☆54Updated 8 years ago
Alternatives and similar repositories for LoadPE
Users that are interested in LoadPE are comparing it to the libraries listed below
Sorting:
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆44Updated 12 years ago
- An Attempt to Bypass Memory Scanners By Misusing the ntdll.dll "RT" Section.☆95Updated 9 years ago
- 内核级ARK工具。☆59Updated 9 years ago
- From 32-bit process to 64-bit process☆70Updated 4 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆107Updated 6 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆83Updated 7 years ago
- ida提取特征码脚本☆56Updated 5 years ago
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- ☆117Updated 7 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- ☆31Updated 6 years ago
- LookDrvCode☆30Updated 11 years ago
- Rapid generation ShellCode☆60Updated 7 years ago
- exploit termdd.sys(support kb4499175)☆59Updated 6 years ago
- 加载内存当中的DLL文件☆84Updated 7 years ago
- Shellcode to load an appended Dll☆90Updated 4 years ago
- ☆26Updated 7 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆98Updated 6 years ago
- x64 dll hijacking tool(like AheadLib)☆56Updated 4 years ago
- 大表哥的Syscall-Monitor☆34Updated 6 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆46Updated 6 years ago
- WIN64驱动编程基础教程-源码 作者:胡文亮☆87Updated 7 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- ☆48Updated 8 years ago
- ☆41Updated 5 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆37Updated 9 years ago
- shellcode注入测试工具☆50Updated 5 years ago
- ☆94Updated 3 years ago
- 反射式注入☆29Updated 6 years ago