Vacko / Managed-code-injection
Inject a .NET assembly into a native process using the CLR Hosting API
☆20Updated 6 years ago
Alternatives and similar repositories for Managed-code-injection:
Users that are interested in Managed-code-injection are comparing it to the libraries listed below
- StrongVM is a virtualizing protector for .NET applications.☆29Updated 2 years ago
- A specialized C# memory-accessing library☆43Updated 6 years ago
- Control flow deobfuscation using Z3 and ILAst☆43Updated 8 years ago
- My small extension to add anti-anti-debbuging support to dnSpy☆42Updated 6 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- This is just a x64dbg script system support.☆46Updated 2 years ago
- .NET library for hooking and dumping Clr☆43Updated 9 months ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- Dump .net assembly from a native loader which uses ClrCreateinstance☆54Updated 2 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- Example deobfuscate .NET Reactor 6.3.0.0 strings(ONLY STRINGS)☆20Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated last year
- A really basic emulator to understand how IL code works.☆56Updated 2 years ago
- Small tool which loads Windows drivers with NtLoadDriver☆44Updated 3 years ago
- win32/x64 obfuscate framework☆32Updated 5 years ago
- CTF writeups☆35Updated 4 months ago
- A simple to use, gui based program for patching .NET assemblies☆39Updated 2 years ago
- VMP Mutation API Fix☆40Updated 3 years ago
- Reads/writes memory, gets process/module info, injects dll, etc.☆46Updated 4 years ago
- VMProtect devirtualizer(WIP)☆25Updated 3 years ago
- Wow64 syscall hook☆40Updated 7 years ago
- Global DLL injector☆66Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Updated 7 years ago
- Analyze PatchGuard☆55Updated 6 years ago
- windows kernel deriver loader(pro)☆46Updated 4 years ago
- ☆48Updated 5 years ago
- PE(compressed dll) memory loader using nt api☆44Updated 7 years ago
- Tool to find Protections used with confuserex☆28Updated 6 years ago
- Another method to anti ThreadHideFromDebugger☆35Updated 6 years ago