Dll Injection and Code injection sample
☆13Mar 10, 2015Updated 10 years ago
Alternatives and similar repositories for WinCodeInjection
Users that are interested in WinCodeInjection are comparing it to the libraries listed below
Sorting:
- ☆11Jun 10, 2015Updated 10 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- 虚拟机逃逸exp工具 VMware Escape Exploit before VMware WorkStation 12.5.5☆10Sep 10, 2017Updated 8 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Apr 14, 2014Updated 11 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- ☆15Mar 8, 2017Updated 8 years ago
- An av windows engine with file guard and compress file enumator☆12Aug 25, 2018Updated 7 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Mar 31, 2014Updated 11 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- ☆21May 10, 2017Updated 8 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated 3 weeks ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 9 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- ☆22Sep 15, 2022Updated 3 years ago
- ☆16Mar 18, 2017Updated 8 years ago
- Microsoft DOS v.2.0 — (Source Codes)☆12Mar 8, 2017Updated 8 years ago
- PE Bliss - Cross-Platform Portable Executable C++ Library☆16Jan 23, 2018Updated 8 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- C++ wrapper for the Windows structured storage implementation known as Compound Files☆20Aug 30, 2020Updated 5 years ago
- ☆22Sep 10, 2020Updated 5 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Hex Studio is a work in progress Hex viewer and editor.☆25Jun 7, 2017Updated 8 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- websocket-protocol's implementation with multithread synchronization model in C++☆17Jul 23, 2017Updated 8 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago