Zer0Mem0ry / StandardInjectionLinks
A simple Dll Injection demonstration
☆120Updated 8 years ago
Alternatives and similar repositories for StandardInjection
Users that are interested in StandardInjection are comparing it to the libraries listed below
Sorting:
- A simple project to demonstrate function hooking / detouring☆127Updated 8 years ago
- x64 usermode rootkit☆208Updated 7 years ago
- A basic Windows DLL injector in C using CreateRemoteThread and LoadLibrary. Implemented for educational purposes.☆129Updated 8 years ago
- RootKit & Cheat Scanner - Windows☆220Updated 6 years ago
- A Simple demonstration of manual dll injector☆207Updated 4 years ago
- Detect manualmapped images remotely, without hassle☆152Updated 7 years ago
- Code that allows running another windows PE in the same address space as the host process.☆455Updated 8 years ago
- User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.☆90Updated 3 years ago
- Inject code into a legitimate process☆145Updated 10 years ago
- PE permutation library☆276Updated 2 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆278Updated 8 years ago
- Manual DLL Injector using Thread Hijacking.☆238Updated 7 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆108Updated 4 years ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆471Updated 5 years ago
- AntiDebugging sample sources written in C++☆343Updated 7 years ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆87Updated 8 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆349Updated 5 years ago
- Windows kernel samples☆255Updated 6 years ago
- ☆42Updated 8 years ago
- Injecting DLL to Target Process. Using C++ in Windows☆65Updated 4 years ago
- Al-khaser is a PoC malware with good intentions that aimes to stress your malware analysis / sandbox environement☆32Updated 11 years ago
- Windows driver for spoofing serial number of HDDs☆218Updated 3 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆222Updated 7 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆308Updated 6 years ago
- driver mapper / capcom wrapper☆223Updated 5 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆414Updated 5 years ago
- Hide Process From Task Manager using Usermode API Hooking☆353Updated 4 years ago
- An Open Source Windows DLL Injector With All Known Techniques Available☆88Updated 7 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆419Updated 7 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆148Updated 2 years ago