eschweiler / DLL-InjectorLinks
injects a DLL into a running process or starts a process with DLL being the very first one imported.
☆34Updated 13 years ago
Alternatives and similar repositories for DLL-Injector
Users that are interested in DLL-Injector are comparing it to the libraries listed below
Sorting:
- Anti-Anti-Debugger Plugins☆19Updated 12 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆66Updated 12 years ago
- Winsock inspection/filtering/modifying☆19Updated 3 years ago
- OllySocketTrace is a plugin for OllyDbg to trace the socket operations being performed by a process.☆63Updated 13 years ago
- Simple standalone bundle of NT core APIs☆27Updated 9 years ago
- DLL Injection commandline utility☆26Updated 12 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 13 years ago
- Anti-AV compilation☆44Updated 12 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆54Updated 13 years ago
- CVE-2014-0816☆25Updated 9 years ago
- Runtime DirectX9 Hooking☆17Updated 3 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Updated 8 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆56Updated 13 years ago
- windows create process with a dll load first time via LdrHook☆31Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 9 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆24Updated 10 years ago
- Bootkits Revisited☆40Updated 11 years ago
- PE Infector/Cryptor source code☆21Updated 3 years ago
- anti-virtualmachine with C!☆22Updated 9 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 12 years ago
- Windows memory hacking library☆21Updated 9 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24Updated 15 years ago