Zhuagenborn / Windows-DLL-Injector
💉 A Windows dynamic-link library injection tool written in C++20. It can inject a dynamic-link library into a running process by its window title or create a new process with an injection.
☆66Updated 2 months ago
Alternatives and similar repositories for Windows-DLL-Injector:
Users that are interested in Windows-DLL-Injector are comparing it to the libraries listed below
- Hide function calls to prevent reverse-engineering☆67Updated 3 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆126Updated 11 months ago
- Dynamically generated obfuscated jumps and/or function calls☆34Updated last year
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆54Updated last year
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆104Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆32Updated 3 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆103Updated last year
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- manual mapping injector☆26Updated 2 years ago
- Easy Anti PatchGuard☆215Updated 3 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆107Updated 2 years ago
- ☆53Updated 2 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated last year
- Hide DLL / Hide Module / Hide Dynamic Link Library☆103Updated 5 years ago
- ☆196Updated last year
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆93Updated 2 years ago
- A simple program to obfuscate code written in cpp.☆47Updated 8 months ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆49Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- x64 syscall caller in C++.☆85Updated 6 years ago
- Protect a process from code injection, termination and hooking☆41Updated 3 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆128Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆177Updated last year
- a ntdll.h head file which download from network, and fix all found problems by me.☆32Updated 3 weeks ago
- A mapper that maps shellcode into loaded large page drivers☆245Updated 2 years ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- ☆68Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆103Updated 2 years ago
- 内核级别隐藏指定窗口☆51Updated 2 years ago