Zhuagenborn / Windows-DLL-Injector
💉 A Windows dynamic-link library injection tool written in C++20. It can inject a dynamic-link library into a running process by its window title or create a new process with an injection.
☆67Updated 5 months ago
Alternatives and similar repositories for Windows-DLL-Injector:
Users that are interested in Windows-DLL-Injector are comparing it to the libraries listed below
- Hide function calls to prevent reverse-engineering☆69Updated 3 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆56Updated 3 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆110Updated 2 years ago
- Hacker Disassembler Engine 64 Copyright (c) 2008-2009, Vyacheslav Patkov. * All rights reserved.☆48Updated 3 years ago
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆105Updated 2 years ago
- manual mapping injector☆28Updated 2 years ago
- Dll memory redirection through Hook NtMapViewOfSection☆97Updated 2 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆105Updated 5 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆78Updated 2 years ago
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- a monitoring windows driver calls kernel api tools☆103Updated 8 months ago
- Windows memory hacking library☆22Updated 6 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆112Updated 3 years ago
- Another method to anti ThreadHideFromDebugger☆36Updated 6 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆57Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated last year
- Elevate a process to be a protected process☆144Updated 5 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 3 years ago
- x64 syscall caller in C++.☆87Updated 6 years ago
- Header only library for obfuscation import winapi functions.☆40Updated last month
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆134Updated 3 years ago
- A CMake template for projects using MS Detours☆21Updated last month
- Analyze tool for windows reverser☆29Updated 2 years ago
- C++ implementation of compile time obfuscator☆142Updated 5 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆143Updated last year