codecrack3 / Run-PE---Run-Portable-Executable-From-Memory
Code that allows running another windows PE in the same address space as the host process.
☆63Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for Run-PE---Run-Portable-Executable-From-Memory
- PoC designed to evade userland-hooking anti-virus.☆85Updated 5 years ago
- Code that allows running another windows PE in the same address space as the host process.☆433Updated 8 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆75Updated last year
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆85Updated 9 years ago
- Inject a Dll from memory☆41Updated 5 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆130Updated 5 years ago
- Execute commands as local system.☆61Updated 5 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆186Updated 8 years ago
- Run any executable as SYSTEM account (no service required)☆124Updated 6 months ago
- Demo service that runs in svchost.exe☆79Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆49Updated 7 years ago
- ☆52Updated 10 years ago
- Collection of DLL function export forwards for DLL export function proxying☆91Updated last year
- Add an empty section to a PE file☆50Updated 7 years ago
- Hide function calls to prevent reverse-engineering☆65Updated 3 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆73Updated 5 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆148Updated 4 years ago
- PE Viewer☆152Updated 3 weeks ago
- ☆28Updated 6 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆50Updated last year
- Reflective PE loader for DLL injection☆167Updated 7 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆81Updated 7 years ago
- Simple windows API logger☆98Updated 5 years ago
- Inject code into a legitimate process☆143Updated 9 years ago
- Header only library for obfuscation import winapi functions.☆32Updated 3 years ago
- Asynchronous Procedure Calls☆194Updated 3 years ago
- A Windows PE format file loader☆137Updated 6 years ago
- Process Hollowing for 32 bit and 64 bit☆80Updated 7 years ago
- A cross-platform Python toolkit for parsing/writing PE files.☆63Updated 5 months ago
- Exploit MsIo vulnerable driver☆83Updated 3 years ago