UserExistsError / InjectDllLinks
Inject a Dll from memory
☆42Updated 5 years ago
Alternatives and similar repositories for InjectDll
Users that are interested in InjectDll are comparing it to the libraries listed below
Sorting:
- Add an empty section to a PE file☆51Updated 7 years ago
- Compile-Time Calls Obfuscator for C++14+☆48Updated last year
- too busy for that all, furikuri is framework for code protection☆160Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆41Updated 6 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆42Updated 4 years ago
- Obfuscate calls to imports by patching in stubs☆69Updated 3 years ago
- Header only library for obfuscation import winapi functions.☆41Updated 4 months ago
- Dump system call codes, names, and offsets from Ntdll.dll☆78Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- A simple program to obfuscate code written in cpp.☆49Updated last year
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆52Updated last year
- Exploit MsIo vulnerable driver☆107Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆37Updated last year
- silence file system monitoring components by hooking their minifilters☆57Updated last year
- A quick-and-dirty anti-hook library proof of concept.☆104Updated 6 years ago
- A driver to intercept low level windows events☆62Updated 5 years ago
- stop any process from looking into your process by hooking.☆20Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 2 years ago
- Bring Your Own Vulnerable Driver for PatchGuard & Driver Signature Enforcement☆13Updated last year
- A library with four different methods to execute shellcode in a process☆27Updated 5 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆57Updated 2 years ago
- Library containing Anti-RE and Anti-Debug methods.☆109Updated 2 months ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆61Updated 2 years ago
- LSASS INJECTOR☆35Updated 6 years ago
- ☆44Updated 4 years ago
- Record & prevent file deletion in kernel mode☆44Updated 4 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago