carterjones / hello-world-dllLinks
a DLL that will show a MessageBox with the message, "Hello world!"
☆84Updated 7 years ago
Alternatives and similar repositories for hello-world-dll
Users that are interested in hello-world-dll are comparing it to the libraries listed below
Sorting:
- Dump system call codes, names, and offsets from Ntdll.dll☆78Updated last year
- Manual DLL Injector using Thread Hijacking.☆238Updated 7 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆84Updated 6 years ago
- Various Process Injection Techniques☆156Updated 3 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆67Updated 2 years ago
- Elevate a process to be a protected process☆153Updated 5 years ago
- My Proof of Concept code for different publicly disclosed vulnerabilities☆47Updated last year
- A PE (Portable Executable) packer with Huffman Compression and Xor encryption.☆64Updated 3 years ago
- A quick-and-dirty anti-hook library proof of concept.☆105Updated 7 years ago
- Detect manualmapped images remotely, without hassle☆154Updated 7 years ago
- Header only library for obfuscation import winapi functions.☆43Updated 6 months ago
- Exploit MsIo vulnerable driver☆112Updated 4 years ago
- proof of concept of user-mode anti-breakpoint technique☆16Updated last year
- A customizable process dumper.☆142Updated 6 years ago
- Custom LoadLibrary / GetProcAddress (x86 / x64) - Load DLL and retrieve functions manually☆94Updated 2 years ago
- A simple DLL to bypass the anti debugging methods from GH Anti Debugging with explanation☆58Updated 5 years ago
- Library containing Anti-RE and Anti-Debug methods.☆110Updated 4 months ago
- DLL Injector using manual map, written in C++☆45Updated 4 years ago
- Hide function calls to prevent reverse-engineering☆71Updated 4 years ago
- Kernel LdrLoadDll injector☆261Updated 6 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆57Updated 3 years ago
- PE-Dump-Fixer☆110Updated 5 years ago
- State of the art DLL injector that took 20 minutes to make☆220Updated 2 years ago
- Injecting DLL to Target Process. Using C++ in Windows☆65Updated 4 years ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆116Updated last year
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆168Updated last year
- Obfuscate calls to imports by patching in stubs☆70Updated 4 years ago
- stop any process from looking into your process by hooking.☆21Updated last year
- A simple project to demonstrate function hooking / detouring☆130Updated 8 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago