awaitlol / Undetected-DLL-Injection-MethodLinks
Undetected DLL Injection Method
☆36Updated 2 years ago
Alternatives and similar repositories for Undetected-DLL-Injection-Method
Users that are interested in Undetected-DLL-Injection-Method are comparing it to the libraries listed below
Sorting:
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆106Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆46Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆33Updated 9 months ago
- ☆58Updated last year
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆135Updated 9 months ago
- ☆80Updated 3 years ago
- Library containing Anti-RE and Anti-Debug methods.☆109Updated 2 months ago
- A kernel injector for EAC and BE☆117Updated last year
- PAGE_GUARD based hooking library☆47Updated 2 years ago
- driver that communicates using a shared section☆65Updated 4 months ago
- The sequel to Voyager☆65Updated 10 months ago
- ☆19Updated 2 years ago
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆108Updated 9 months ago
- Hardware ID☆48Updated 3 years ago
- Compile-Time Calls Obfuscator for C++14+☆48Updated last year
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆161Updated last year
- stop any process from looking into your process by hooking.☆21Updated last year
- PoC kernel to usermode injection☆87Updated last year
- Manual map shellcode (aka byte array) injector☆73Updated 6 months ago
- An other Detected & Pasted driver☆24Updated 3 years ago
- Using SetWindowHookEx for preinjected DLL's☆58Updated 2 years ago
- Kernel Level NMI Callback Blocker☆108Updated 10 months ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆57Updated 9 months ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- ☆53Updated 2 years ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆66Updated last year
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆67Updated 10 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆92Updated 2 years ago
- Made by scammer so i leak for free ! have fun☆54Updated 2 years ago