SaturnsVoid / Process-ProtectionLinks
Basic windows process protection written in Go, using the NtSetInformationProcess API
☆18Updated 8 years ago
Alternatives and similar repositories for Process-Protection
Users that are interested in Process-Protection are comparing it to the libraries listed below
Sorting:
- x86 WinAPI hook written in pure Go☆50Updated 5 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- Go wrapper for in-memory DLL module loader, MemoryModule☆32Updated 7 years ago
- A modular Go source code level control flow obfuscator, made in Go.☆39Updated 4 years ago
- This repository has been moved to https://github.com/kirides/go-d3d☆52Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- UPX-like packer written in Go☆75Updated 3 years ago
- Convert PE files to a shellcode☆79Updated 5 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆69Updated 3 years ago
- 以shellcode注入其它驱动执行,躲避驱动签名检测,曾pubg项目中使用,,,当然现在,,,☆26Updated 2 years ago
- Anti-Rootkit Tool for Windows☆12Updated 5 months ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 3 years ago
- A simple program to obfuscate code written in cpp.☆51Updated last year
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- Shellcode to load an appended Dll☆89Updated 4 years ago
- Record & prevent file deletion in kernel mode☆44Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆60Updated 4 years ago
- Go interface to NTDLL functions☆78Updated last year
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆38Updated last year
- Add export function and convert exe to dll☆26Updated 4 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆30Updated 3 years ago
- Win32 API and COM hooking/tracing.☆30Updated 9 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Updated 3 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- Call NtCreateUserProcess directly as normal.☆72Updated 3 years ago
- From 32-bit process to 64-bit process☆70Updated 4 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Hide Port In Windows☆40Updated 10 months ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆166Updated 4 years ago
- execute a PE in the address space of another PE aka process hollowing☆58Updated 3 years ago