Zhuagenborn / Windows-DLL-InjectorLinks
💉 A Windows dynamic-link library injection tool written in C++20. It can inject a dynamic-link library into a running process by its window title or create a new process with an injection.(使用C++20开发的Windows动态链接库注入工具,可以通过窗口标题注入运行中的进程,或在创建新进程时注入。)
☆68Updated last year
Alternatives and similar repositories for Windows-DLL-Injector
Users that are interested in Windows-DLL-Injector are comparing it to the libraries listed below
Sorting:
- A simple program to obfuscate code written in cpp.☆51Updated last year
- Header only library for obfuscation import winapi functions.☆43Updated 8 months ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆106Updated 6 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆113Updated 3 years ago
- ☆55Updated 8 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- C++ Program used to dump Themida and VMProtect.☆31Updated last year
- Add an empty section to a PE file☆53Updated 8 years ago
- C++ implementation of compile time obfuscator☆161Updated 6 years ago
- A platform independent C++ code obfuscator.☆13Updated 6 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Updated 4 years ago
- Protect a process from code injection, termination and hooking☆49Updated 4 years ago
- Obfuscate calls to imports by patching in stubs☆71Updated 4 years ago
- Inject a Dll from memory☆45Updated 6 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆46Updated 6 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- sc4cpp is a shellcode framework based on C++☆93Updated 4 years ago
- manual mapping injector☆28Updated last month
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 4 years ago
- Based on minhook☆34Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- Just tried, unusable☆46Updated last year
- Examples of basic windows API hooking techniques☆20Updated 5 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- a ntdll.h head file which download from network, and fix all found problems by me.☆33Updated 9 months ago
- It's a kernel-based keylogger for Windows x86/x64.☆141Updated 3 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 3 years ago
- Vutils or Vic Utilities is an utility library written in Modern C++ and for Modern C++. It helps your programming go easier, faster, and …☆69Updated last year
- Hide function calls to prevent reverse-engineering☆72Updated 4 years ago