Zhuagenborn / Windows-DLL-InjectorLinks
💉 A Windows dynamic-link library injection tool written in C++20. It can inject a dynamic-link library into a running process by its window title or create a new process with an injection.(使用C++20开发的Windows动态链接库注入工具,可以通过窗口标题注入运行中的进程,或在创建新进程时注入。)
☆67Updated 7 months ago
Alternatives and similar repositories for Windows-DLL-Injector
Users that are interested in Windows-DLL-Injector are comparing it to the libraries listed below
Sorting:
- Library containing Anti-RE and Anti-Debug methods.☆108Updated last month
- manual mapping injector☆27Updated 3 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆40Updated 3 months ago
- Hacker Disassembler Engine 64 Copyright (c) 2008-2009, Vyacheslav Patkov. * All rights reserved.☆50Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- Just tried, unusable☆38Updated 7 months ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆50Updated 3 months ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆159Updated last year
- Simple Kernelmode DLL Injector with Manual mapping☆291Updated last year
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆322Updated 2 years ago
- PoC kernel to usermode injection☆83Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆106Updated 3 years ago
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- x64 syscall caller in C++.☆90Updated 6 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Hide function calls to prevent reverse-engineering☆69Updated 4 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆94Updated 4 years ago
- IAT Hooking POC (x86 / x64) - Hook functions through the IAT☆33Updated 10 months ago
- Using SetWindowHookEx for preinjected DLL's☆58Updated 2 years ago
- Exploit MsIo vulnerable driver☆104Updated 3 years ago
- Driver that communicates using a shared section☆57Updated 2 months ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- 滥用cow机制进行全局注入☆97Updated 4 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆53Updated 7 months ago
- ☆68Updated 3 years ago
- Record & prevent file deletion in kernel mode☆43Updated 4 years ago