Zhuagenborn / Windows-DLL-Injector
💉 A Windows dynamic-link library injection tool written in C++20. It can inject a dynamic-link library into a running process by its window title or create a new process with an injection.
☆66Updated last month
Related projects ⓘ
Alternatives and complementary repositories for Windows-DLL-Injector
- 💻 A Windows console remote administration tool written in Go & Intel x86 Assembly. It supports remote shell and screenshot.☆72Updated 7 months ago
- Dll memory redirection through Hook NtMapViewOfSection☆86Updated 2 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆99Updated 2 years ago
- Vutils or Vic Utilities is an utility library written in Modern C++ and for Modern C++. It helps your programming go easier, faster, and …☆68Updated 2 months ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆52Updated last year
- A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.☆173Updated last month
- Easy Anti PatchGuard☆214Updated 3 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆30Updated last year
- Hide function calls to prevent reverse-engineering☆65Updated 3 years ago
- force delete runing .exe application file.or delete any locked file☆70Updated last year
- Hide DLL / Hide Module / Hide Dynamic Link Library☆101Updated 5 years ago
- sc4cpp is a shellcode framework based on C++☆87Updated 3 years ago
- manual mapping injector☆26Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆226Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆93Updated 2 years ago
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆101Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆32Updated 3 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆67Updated 3 years ago
- ☆29Updated 3 years ago
- A simple program to obfuscate code written in cpp.☆46Updated 6 months ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆91Updated last year
- Detecting Windows x86 API hooking and modification for analysis purposes☆21Updated 2 years ago
- Elevate a process to be a protected process☆143Updated 5 years ago
- Windows memory hacking library☆22Updated 6 years ago
- Dump Microsoft Portable Executable (PE) Files Information☆13Updated 5 months ago
- ☆46Updated 9 months ago
- StrongOD(anti anti-debug plugin) driver source code.☆113Updated 7 years ago
- It's a kernel-based keylogger for Windows x86/x64.☆127Updated 2 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆123Updated 3 years ago