Zer0Mem0ry / StandardInjectionLinks
A simple Dll Injection demonstration
☆120Updated 8 years ago
Alternatives and similar repositories for StandardInjection
Users that are interested in StandardInjection are comparing it to the libraries listed below
Sorting:
- A simple project to demonstrate function hooking / detouring☆130Updated 8 years ago
- A basic Windows DLL injector in C using CreateRemoteThread and LoadLibrary. Implemented for educational purposes.☆128Updated 8 years ago
- x64 usermode rootkit☆206Updated 7 years ago
- Detect manualmapped images remotely, without hassle☆154Updated 7 years ago
- PE permutation library☆276Updated 2 years ago
- A Simple demonstration of manual dll injector☆204Updated 4 years ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆87Updated 8 years ago
- Code that allows running another windows PE in the same address space as the host process.☆450Updated 8 years ago
- Inject code into a legitimate process☆145Updated 10 years ago
- ☆42Updated 8 years ago
- AntiDebugging sample sources written in C++☆342Updated 7 years ago
- RootKit & Cheat Scanner - Windows☆219Updated 6 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆275Updated 8 years ago
- Windows driver for spoofing serial number of HDDs☆215Updated 2 years ago
- Manual DLL Injector using Thread Hijacking.☆238Updated 7 years ago
- Al-khaser is a PoC malware with good intentions that aimes to stress your malware analysis / sandbox environement☆32Updated 11 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆349Updated 4 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆107Updated 4 years ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆468Updated 5 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆306Updated 6 years ago
- Injecting DLL to Target Process. Using C++ in Windows☆65Updated 4 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆220Updated 6 years ago
- BattlEye compatible injector, done completely from user-mode, project by secret.club☆245Updated 4 years ago
- This is a simple mutation engine. It does not have many features and you have to add actual mutation, when you want to use it - It does m…☆35Updated 7 years ago
- User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.☆88Updated 3 years ago
- A kernel rootkit with remote command and control interface for windows☆109Updated 7 years ago
- driver mapper / capcom wrapper☆221Updated 5 years ago
- Rendering on external windows via hijacking thread contexts☆398Updated 5 years ago
- Windows kernel samples☆254Updated 6 years ago
- An Open Source Windows DLL Injector With All Known Techniques Available☆86Updated 7 years ago