bgarciaoliveira / InjectHookLinks
A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying application behavior at runtime. Ideal for educational purposes, debugging, and dynamic software analysis.
☆38Updated 2 years ago
Alternatives and similar repositories for InjectHook
Users that are interested in InjectHook are comparing it to the libraries listed below
Sorting:
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆52Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆67Updated last year
- EvtPsst☆55Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- BYOVD Technique Example using viragt64 driver☆59Updated last year
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆39Updated 9 months ago
- Demoting PPL anti-malware services to less than a guest user☆63Updated 9 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- ☆60Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Parent Process ID Spoofing, coded in CGo.☆23Updated 6 months ago
- API Hammering with C++20☆49Updated 3 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆73Updated 2 years ago
- ECC Public Key Cryptography☆38Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- ☆58Updated last year
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆25Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- using the gpu to hide your payload☆63Updated 3 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 11 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆25Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated 4 months ago
- ☆28Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago