LakshmiDesai / LoadPELinks
☆55Updated 9 years ago
Alternatives and similar repositories for LoadPE
Users that are interested in LoadPE are comparing it to the libraries listed below
Sorting:
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Updated 12 years ago
- An Attempt to Bypass Memory Scanners By Misusing the ntdll.dll "RT" Section.☆99Updated 10 years ago
- 内核级ARK工具。☆62Updated 9 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆108Updated 6 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 4 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆85Updated 8 years ago
- From 32-bit process to 64-bit process☆69Updated 4 years ago
- ☆120Updated 7 years ago
- ☆26Updated 8 years ago
- ☆27Updated 6 years ago
- exploit termdd.sys(support kb4499175)☆61Updated 6 years ago
- Shellcode to load an appended Dll☆91Updated 5 years ago
- LookDrvCode☆31Updated 11 years ago
- shellcode注入测试工具☆51Updated 6 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 5 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆59Updated 6 years ago
- 锁主页驱动☆39Updated 6 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Updated 7 years ago
- 大表哥的Syscall-Monitor☆34Updated 6 years ago
- ☆48Updated 8 years ago
- PE(compressed dll) memory loader using nt api☆46Updated 8 years ago
- ☆25Updated 6 years ago
- Rapid generation ShellCode☆60Updated 8 years ago
- ida提取特征码脚本☆56Updated 6 years ago
- win10 pgContext dynamic dump (btc version)☆107Updated 6 years ago
- inject dll from kernal mode to user mode process use Apc☆33Updated 5 years ago
- Automatically exported from code.google.com/p/wskudp☆43Updated 9 years ago
- A simple rootkit to hide a process☆47Updated 12 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆101Updated 7 years ago
- 加载内存当中的DLL文件☆83Updated 7 years ago