Recreation of GetProcAddress without external dependencies on Windows Libraries
☆91Jan 22, 2016Updated 10 years ago
Alternatives and similar repositories for GetProcAddress
Users that are interested in GetProcAddress are comparing it to the libraries listed below
Sorting:
- Code injection by hijacking threads in Windows 32-bit applications☆44Oct 3, 2018Updated 7 years ago
- Wow64 syscall hook☆43May 28, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- User-mode hook bypassing method☆33Aug 26, 2016Updated 9 years ago
- Hidden module/dll detector for windows apps☆15May 21, 2017Updated 8 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- ☆27Apr 4, 2019Updated 6 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- ☆21Jul 18, 2017Updated 8 years ago
- RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, doc…☆72Sep 5, 2020Updated 5 years ago
- ☆82Dec 3, 2017Updated 8 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- Example library for how to dynamically/statically hook/intercept unmanaged functions and APIs☆13Nov 9, 2022Updated 3 years ago
- Managed wrappers around the Windows API and some Native API☆35Jun 15, 2018Updated 7 years ago
- Windows handle stealing POC with NtDuplicateObject☆41May 7, 2017Updated 8 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Manual PE image mapper☆66Aug 29, 2013Updated 12 years ago
- New handle stealing technique for windows apps☆14Oct 6, 2017Updated 8 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- Windows工具类☆28Apr 23, 2017Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- A sample on how to inject a DLL from a kernel driver☆61Sep 13, 2016Updated 9 years ago
- Library for kernel and user mode splicing for Windows (x86 and x64).☆64Oct 29, 2012Updated 13 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- TLB splitting module for the Bareflank Hypervisor.☆12Sep 23, 2018Updated 7 years ago
- library, which help to describe or load and execute PE files.☆55Jun 23, 2013Updated 12 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- lol amf协议解析☆15Nov 10, 2016Updated 9 years ago
- Detect the SCI in windows.☆11Mar 23, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument…☆15Mar 4, 2018Updated 8 years ago