adrianyy / x64-injectorView external linksLinks
x64 injector using LoadLibrary made in assembler (MASM)
☆27Jun 28, 2018Updated 7 years ago
Alternatives and similar repositories for x64-injector
Users that are interested in x64-injector are comparing it to the libraries listed below
Sorting:
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- ☆16Jan 27, 2019Updated 7 years ago
- ☆29Dec 29, 2022Updated 3 years ago
- Lightweight C++11 library with a tidy API, built using Capstone, to facilitate creating and tracking function-level and instruction-level…☆45Jul 25, 2025Updated 6 months ago
- Not mine, just saved☆14Nov 12, 2023Updated 2 years ago
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆17Apr 30, 2020Updated 5 years ago
- Disable NMI Callbacks with Kernelmode Driver☆18Mar 15, 2023Updated 2 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Free(or force?)file and delete it☆11Feb 23, 2019Updated 6 years ago
- ☆26Oct 5, 2019Updated 6 years ago
- 自写驱动内存注入☆29May 31, 2021Updated 4 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- Process path modification x64☆60Jul 18, 2018Updated 7 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- ☆15Oct 24, 2020Updated 5 years ago
- Kernel LdrLoadDll injector☆264Oct 6, 2018Updated 7 years ago
- This is the documentation of HyperDbg Debugger. You can also visit https://docs.hyperdbg.org☆24Feb 8, 2026Updated last week
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆48Apr 7, 2021Updated 4 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- My Personal Kernel-Mode Process dumper☆13Feb 18, 2024Updated last year
- Android 脱壳☆14Mar 23, 2022Updated 3 years ago
- A PE32/PE32+ parser written in MASM32☆13Feb 24, 2016Updated 9 years ago
- ☆11Aug 9, 2018Updated 7 years ago
- X32DBG QT5 parsing scripts☆11Sep 8, 2022Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Oct 10, 2022Updated 3 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- A class to gather information about a process, its threads and modules.☆23Mar 23, 2020Updated 5 years ago
- 无痕注入1☆77Jun 1, 2021Updated 4 years ago
- ☆16Aug 28, 2024Updated last year
- 对debughelp的二次开发☆11Feb 20, 2023Updated 2 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Oct 4, 2018Updated 7 years ago