Zer0Mem0ry / StandardInjection
A simple Dll Injection demonstration
☆120Updated 8 years ago
Alternatives and similar repositories for StandardInjection
Users that are interested in StandardInjection are comparing it to the libraries listed below
Sorting:
- A simple project to demonstrate function hooking / detouring☆128Updated 8 years ago
- A Simple demonstration of manual dll injector☆203Updated 3 years ago
- A basic Windows DLL injector in C using CreateRemoteThread and LoadLibrary. Implemented for educational purposes.☆128Updated 7 years ago
- Windows kernel samples☆249Updated 6 years ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆87Updated 8 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆275Updated 8 years ago
- Detect manualmapped images remotely, without hassle☆154Updated 7 years ago
- Manual DLL Injector using Thread Hijacking.☆238Updated 7 years ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆465Updated 5 years ago
- x64 usermode rootkit☆204Updated 7 years ago
- driver mapper / capcom wrapper☆220Updated 5 years ago
- A simple program to demonstrate external signature scanning.☆68Updated 2 years ago
- PE permutation library☆273Updated 2 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆108Updated 4 years ago
- KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK☆495Updated 2 years ago
- Inject code into a legitimate process☆144Updated 10 years ago
- Kernel mode driver for reading/writing process memory. C/Win32.☆292Updated 7 years ago
- Rendering on external windows via hijacking thread contexts☆390Updated 4 years ago
- ☆167Updated 7 years ago
- Injecting DLL to Target Process. Using C++ in Windows☆65Updated 4 years ago
- Al-khaser is a PoC malware with good intentions that aimes to stress your malware analysis / sandbox environement☆32Updated 10 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆417Updated 6 years ago
- AntiDebugging sample sources written in C++☆340Updated 6 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆345Updated 4 years ago
- RootKit & Cheat Scanner - Windows☆217Updated 5 years ago
- Simple benchmark for findpattern implementations.☆161Updated 3 months ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆183Updated 4 years ago
- Code that allows running another windows PE in the same address space as the host process.☆446Updated 8 years ago
- driver manual mapper (outdated/for educational purposes)☆101Updated 5 years ago
- DLL scatter manual mapper☆742Updated 4 years ago