UserExistsError / InjectDll
Inject a Dll from memory
☆41Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for InjectDll
- Add an empty section to a PE file☆50Updated 7 years ago
- silence file system monitoring components by hooking their minifilters☆51Updated 9 months ago
- A library with four different methods to execute shellcode in a process☆25Updated 4 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆71Updated last year
- x64 syscall caller in C++.☆84Updated 6 years ago
- LSASS INJECTOR☆33Updated 5 years ago
- too busy for that all, furikuri is framework for code protection☆157Updated 5 years ago
- Exploit MsIo vulnerable driver☆83Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆64Updated 3 years ago
- A quick-and-dirty anti-hook library proof of concept.☆101Updated 6 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆81Updated 5 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆226Updated 2 years ago
- Binary rewriter for 64-bit PE files.☆43Updated 9 months ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆75Updated last year
- Resolve DOS MZ executable symbols at runtime☆93Updated 3 years ago
- Header only library for obfuscation import winapi functions.☆32Updated 3 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆47Updated 2 months ago
- Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.☆58Updated 5 years ago
- c++ implementation of windows heavens gate☆55Updated 3 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆46Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆33Updated last year
- Record & prevent file deletion in kernel mode☆40Updated 4 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆49Updated last year
- Hide function calls to prevent reverse-engineering☆65Updated 3 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆50Updated last year
- Example Windows Kernel-mode Driver which enumerates running processes.☆54Updated 2 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆73Updated 5 years ago
- Sample project that encrypts windows 32-bit executables with password☆51Updated 2 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆63Updated last year