LakshmiDesai / LoadPELinks
☆55Updated 8 years ago
Alternatives and similar repositories for LoadPE
Users that are interested in LoadPE are comparing it to the libraries listed below
Sorting:
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 4 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Updated 12 years ago
- 内核级ARK工具。☆62Updated 9 years ago
- An Attempt to Bypass Memory Scanners By Misusing the ntdll.dll "RT" Section.☆97Updated 9 years ago
- LookDrvCode☆31Updated 11 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆106Updated 6 years ago
- ☆26Updated 8 years ago
- From 32-bit process to 64-bit process☆69Updated 4 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆84Updated 8 years ago
- ☆118Updated 7 years ago
- Rapid generation ShellCode☆61Updated 8 years ago
- exploit termdd.sys(support kb4499175)☆60Updated 6 years ago
- ☆27Updated 6 years ago
- ☆97Updated 4 years ago
- ida提取特征码脚本☆56Updated 5 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Updated 7 years ago
- x64 dll hijacking tool(like AheadLib)☆57Updated 4 years ago
- shellcode注入测试工具☆51Updated 6 years ago
- A simple rootkit to hide a process☆47Updated 11 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Shellcode to load an appended Dll☆89Updated 4 years ago
- Windows sandbox PoC☆32Updated 5 years ago
- ☆48Updated 8 years ago
- 大表哥的Syscall-Monitor☆34Updated 6 years ago
- 反射式注入☆29Updated 6 years ago
- 加载内存当中的DLL文件☆83Updated 7 years ago
- sc4cpp is a shellcode framework based on C++☆92Updated 4 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆38Updated 10 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Updated 7 years ago
- ☆39Updated 5 years ago