Proof of concept implementation of in-memory PE Loader based on ReflectiveDLLInjection Technique
☆159Oct 29, 2018Updated 7 years ago
Alternatives and similar repositories for Pe-Loader-Sample
Users that are interested in Pe-Loader-Sample are comparing it to the libraries listed below
Sorting:
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- ☆42Mar 7, 2017Updated 8 years ago
- In-Memory PE Loader☆377Oct 7, 2019Updated 6 years ago
- Simple 32/64-bit PEs loader.☆139Dec 19, 2018Updated 7 years ago
- Dll Convert to Shellcode.☆41Jul 4, 2022Updated 3 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆383Apr 17, 2017Updated 8 years ago
- library, which help to describe or load and execute PE files.☆55Jun 23, 2013Updated 12 years ago
- simple PE packer written in C++☆56Feb 23, 2018Updated 8 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆581Feb 8, 2026Updated 3 weeks ago
- Universal Unhooking☆326Sep 19, 2018Updated 7 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Process Doppelgänging☆162Dec 19, 2017Updated 8 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆341Jul 30, 2017Updated 8 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Sep 26, 2019Updated 6 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆54Nov 4, 2011Updated 14 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆84Dec 23, 2010Updated 15 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Updated this week
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆229Mar 22, 2023Updated 2 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆940Mar 28, 2021Updated 4 years ago
- Branch based windows debugger☆22Jul 30, 2019Updated 6 years ago
- ☆33Mar 4, 2022Updated 3 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Jan 24, 2011Updated 15 years ago
- PE file manipulation library☆79Jul 30, 2020Updated 5 years ago
- Inject code into a legitimate process☆146Dec 9, 2014Updated 11 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- Passive UAC elevation using dll infection☆75Nov 7, 2014Updated 11 years ago
- Shellcode Compiler☆1,149Sep 1, 2024Updated last year
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Dec 17, 2018Updated 7 years ago
- ☆11Aug 21, 2016Updated 9 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Nov 4, 2011Updated 14 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆101Nov 5, 2018Updated 7 years ago