azerg / Remote_DLL_Injector
Stealth DLL injector
☆86Updated last month
Related projects: ⓘ
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆46Updated 9 years ago
- ☆87Updated this week
- x64 usermode rootkit☆199Updated 6 years ago
- ☆112Updated 11 years ago
- Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303☆106Updated 6 years ago
- ☆155Updated this week
- C++☆79Updated 8 years ago
- Hiding x32/x64 Modules/DLLs using PEB☆64Updated 9 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆54Updated 5 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆88Updated 7 years ago
- Load a Windows Kernel Driver☆89Updated 7 years ago
- BattlEye x64 usermode injector☆61Updated 5 years ago
- Disable Driver Callbacks☆97Updated 6 years ago
- ☆105Updated 5 years ago
- ☆48Updated this week
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆125Updated 7 years ago
- ☆58Updated this week
- x86/x64 manual mapping injector using the JUCE library☆81Updated 4 years ago
- Capcom wrapper with safety in mind.☆77Updated 6 years ago
- A simple rootkit to hide a process☆44Updated 10 years ago
- ☆79Updated this week
- disable most common windowsx64 systems patchguard☆82Updated 5 years ago
- windows kernelmode and usermode IAT hook☆140Updated 3 years ago
- ☆81Updated this week
- ☆75Updated this week
- Collection Of Anti-Debugging Tricks☆96Updated 8 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆111Updated 5 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆63Updated 11 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- Bypass User Account Control by manipulating tokens☆31Updated 6 years ago