Zer0Mem0ry / StandardInjectionLinks
A simple Dll Injection demonstration
☆121Updated 8 years ago
Alternatives and similar repositories for StandardInjection
Users that are interested in StandardInjection are comparing it to the libraries listed below
Sorting:
- A simple project to demonstrate function hooking / detouring☆127Updated 8 years ago
- A basic Windows DLL injector in C using CreateRemoteThread and LoadLibrary. Implemented for educational purposes.☆131Updated 8 years ago
- x64 usermode rootkit☆211Updated 7 years ago
- PE permutation library☆277Updated 2 years ago
- Inject code into a legitimate process☆146Updated 11 years ago
- AntiDebugging sample sources written in C++☆343Updated 7 years ago
- Code that allows running another windows PE in the same address space as the host process.☆458Updated 9 years ago
- Detect manualmapped images remotely, without hassle☆152Updated 8 years ago
- User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.☆96Updated 3 years ago
- RootKit & Cheat Scanner - Windows☆224Updated 6 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆276Updated 9 years ago
- A Simple demonstration of manual dll injector☆208Updated 4 years ago
- Manual DLL Injector using Thread Hijacking.☆240Updated 8 years ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆473Updated 6 years ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆86Updated 9 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆314Updated 7 years ago
- Injecting DLL to Target Process. Using C++ in Windows☆65Updated 5 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆226Updated 7 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆107Updated 5 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆154Updated 2 years ago
- ☆42Updated 8 years ago
- Hide Process From Task Manager using Usermode API Hooking☆358Updated 4 years ago
- a DLL that will show a MessageBox with the message, "Hello world!"☆86Updated 7 years ago
- A kernel rootkit with remote command and control interface for windows☆109Updated 8 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆353Updated 5 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆421Updated 7 years ago
- Windows driver for spoofing serial number of HDDs☆220Updated 3 years ago
- Windows kernel samples☆256Updated 6 years ago
- 🛡️ Obfuscator, Encryption, Junkcode, Anti-Debug, PE protection/modification☆522Updated 8 years ago
- driver mapper / capcom wrapper☆228Updated 6 years ago