LakshmiDesai / LoadPELinks
☆55Updated 8 years ago
Alternatives and similar repositories for LoadPE
Users that are interested in LoadPE are comparing it to the libraries listed below
Sorting:
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 4 years ago
- An Attempt to Bypass Memory Scanners By Misusing the ntdll.dll "RT" Section.☆98Updated 9 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Updated 12 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆84Updated 8 years ago
- 内核级ARK工具。☆62Updated 9 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆106Updated 6 years ago
- From 32-bit process to 64-bit process☆69Updated 4 years ago
- LookDrvCode☆31Updated 11 years ago
- ☆26Updated 8 years ago
- ☆118Updated 7 years ago
- ida提取特征码脚本☆56Updated 5 years ago
- 加载内存当中的DLL文件☆83Updated 7 years ago
- 大表哥的Syscall-Monitor☆34Updated 6 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆38Updated 10 years ago
- ☆48Updated 8 years ago
- ☆97Updated 4 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 4 years ago
- ☆27Updated 6 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆100Updated 7 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆59Updated 6 years ago
- Rapid generation ShellCode☆61Updated 8 years ago
- Shellcode to load an appended Dll☆91Updated 5 years ago
- sc4cpp is a shellcode framework based on C++☆93Updated 4 years ago
- A simple rootkit to hide a process☆47Updated 11 years ago
- shellcode注入测试工具☆51Updated 6 years ago
- exploit termdd.sys(support kb4499175)☆60Updated 6 years ago
- ☆24Updated 6 years ago
- 锁主页驱动☆38Updated 6 years ago
- Another method to anti ThreadHideFromDebugger☆37Updated 6 years ago
- ☆39Updated 6 years ago