☆408Mar 1, 2017Updated 9 years ago
Alternatives and similar repositories for Reflective-Driver-Loader
Users that are interested in Reflective-Driver-Loader are comparing it to the libraries listed below
Sorting:
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆341Jul 30, 2017Updated 8 years ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,201Aug 1, 2019Updated 6 years ago
- Universal PatchGuard and Driver Signature Enforcement Disable☆862Mar 29, 2019Updated 6 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆748Jun 26, 2017Updated 8 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- Shellcode Compiler☆1,151Sep 1, 2024Updated last year
- windows syscall table from xp ~ 10 rs4☆356Jun 8, 2018Updated 7 years ago
- Protected Processes Light Killer☆981Mar 24, 2023Updated 2 years ago
- ☆48Jun 19, 2017Updated 8 years ago
- PatchGuard Research☆304Oct 6, 2018Updated 7 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Jul 11, 2018Updated 7 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆123Jun 27, 2017Updated 8 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆635Jul 7, 2017Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- Windows kernel-mode callbacks tutorial driver☆48Aug 8, 2016Updated 9 years ago
- WinDBG Anti-RootKit Extension☆646Jul 29, 2020Updated 5 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆141Apr 4, 2017Updated 8 years ago
- Windows x64 Driver Signature Enforcement Overrider☆799Dec 4, 2018Updated 7 years ago
- A memory scanning evasion technique☆901May 24, 2017Updated 8 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- An attempt at Process Doppelgänging☆183Dec 21, 2017Updated 8 years ago
- modify from memorymodule. support exception☆223Oct 22, 2020Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- This driver implements the Intel Processor Trace functionality in Intel Skylake architecture for Microsoft Windows☆466Apr 17, 2018Updated 7 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracke…☆411Dec 27, 2024Updated last year
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- windows create process with a dll load first time via LdrHook☆31Oct 21, 2016Updated 9 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,274May 1, 2024Updated last year
- ☆825Dec 28, 2019Updated 6 years ago