Zer0Mem0ry / StandardInjectionLinks
A simple Dll Injection demonstration
☆120Updated 8 years ago
Alternatives and similar repositories for StandardInjection
Users that are interested in StandardInjection are comparing it to the libraries listed below
Sorting:
- A simple project to demonstrate function hooking / detouring☆128Updated 8 years ago
- x64 usermode rootkit☆208Updated 7 years ago
- A Simple demonstration of manual dll injector☆208Updated 4 years ago
- A basic Windows DLL injector in C using CreateRemoteThread and LoadLibrary. Implemented for educational purposes.☆129Updated 8 years ago
- PE permutation library☆276Updated 2 years ago
- Detect manualmapped images remotely, without hassle☆154Updated 7 years ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆87Updated 8 years ago
- Inject code into a legitimate process☆145Updated 10 years ago
- AntiDebugging sample sources written in C++☆343Updated 7 years ago
- Code that allows running another windows PE in the same address space as the host process.☆454Updated 8 years ago
- Manual DLL Injector using Thread Hijacking.☆239Updated 7 years ago
- RootKit & Cheat Scanner - Windows☆219Updated 6 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆276Updated 8 years ago
- An Open Source Windows DLL Injector With All Known Techniques Available☆87Updated 7 years ago
- User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.☆89Updated 3 years ago
- Injecting DLL to Target Process. Using C++ in Windows☆65Updated 4 years ago
- Windows driver for spoofing serial number of HDDs☆217Updated 3 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆107Updated 4 years ago
- ☆14Updated 8 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆350Updated 5 years ago
- Al-khaser is a PoC malware with good intentions that aimes to stress your malware analysis / sandbox environement☆32Updated 11 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆148Updated 2 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆221Updated 7 years ago
- A simple program to demonstrate external signature scanning.☆68Updated 3 years ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆473Updated 5 years ago
- driver mapper / capcom wrapper☆222Updated 5 years ago
- Windows kernel samples☆255Updated 6 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆78Updated last year
- A kernel rootkit with remote command and control interface for windows☆110Updated 7 years ago
- Hide Process From Task Manager using Usermode API Hooking☆352Updated 4 years ago