ZeroMemoryEx / Dll-InjectorLinks
simple C++ dll injector
☆60Updated 4 years ago
Alternatives and similar repositories for Dll-Injector
Users that are interested in Dll-Injector are comparing it to the libraries listed below
Sorting:
- simple user-mode Rootkit☆108Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆158Updated 2 years ago
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆177Updated 2 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆62Updated 2 years ago
- Undetected DLL Injection Method☆35Updated 2 years ago
- manual map unsigned driver over signed memory☆214Updated last year
- State of the art DLL injector that took 20 minutes to make☆226Updated 2 years ago
- a simple C++ tool using the windows registry to disable windows defender☆13Updated 4 years ago
- load unsigned kernel-driver by patching dse in 248 lines☆139Updated last year
- Simple x86 Trampoline Hook☆45Updated 3 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆223Updated last year
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Updated last year
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆196Updated last year
- Simple API Hooks detector☆77Updated 3 years ago
- ☆46Updated last year
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆147Updated last year
- ☆63Updated 2 years ago
- Various Process Injection Techniques☆163Updated 3 years ago
- Fully working kernel-mode VAC bypass☆92Updated 11 months ago
- Simple proof of concept kernel mode driver hooking tpm.sys dispatch to randomize any public key reads☆233Updated 2 years ago
- ☆352Updated 8 months ago
- UEFI Bootkit with user-mode communication☆115Updated 7 months ago
- a always updated and undetected temp spoof driver☆28Updated 10 months ago
- anti crack system protector☆105Updated 2 years ago
- proof of concept of user-mode anti-breakpoint technique☆16Updated 2 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆276Updated 2 years ago
- Exploit MsIo vulnerable driver☆124Updated 4 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆192Updated 2 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆21Updated 4 years ago
- Kernel Level NMI Callback Blocker☆154Updated 4 months ago