fancycode / MemoryModuleLinks
Library to load a DLL from memory.
☆3,092Updated 2 years ago
Alternatives and similar repositories for MemoryModule
Users that are interested in MemoryModule are comparing it to the libraries listed below
Sorting:
- Windows memory hacking library☆5,328Updated 2 years ago
- Hook system calls, context switches, page faults and more.☆2,627Updated 2 years ago
- C++20, x86/x64 Hooking Libary v2.0☆1,811Updated 2 months ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,216Updated 3 years ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆2,003Updated 3 years ago
- Windows Object Explorer 64-bit☆1,880Updated 2 weeks ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆998Updated 3 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,319Updated 3 months ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,888Updated 2 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆5,490Updated 3 months ago
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,505Updated last month
- Obfuscation library based on C++20 and metaprogramming☆1,667Updated last month
- Hiding kernel-driver for x86/x64.☆2,602Updated 5 months ago
- Native API header files for the System Informer project.☆1,330Updated 8 months ago
- Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.☆6,123Updated last month
- EasyHook - The reinvention of Windows API Hooking☆3,263Updated 2 years ago
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,795Updated 2 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,267Updated last year
- heavily vectorized c++17 compile time string encryption.☆1,403Updated 4 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆578Updated 7 months ago
- Windows NT Syscall tables☆1,380Updated last month
- x86/x64 C++ Hooking Library☆922Updated 5 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,187Updated 6 years ago
- Protected Processes Light Killer☆976Updated 2 years ago
- windows kernel security development☆2,055Updated 3 years ago
- A Windows API hooking library☆757Updated 4 years ago
- A free but powerful Windows kernel research tool.☆2,642Updated last month
- Windows tool for dumping malware PE files from memory back to disk for analysis.☆1,819Updated last year
- PE Tools - Portable executable (PE) manipulation toolkit☆1,162Updated 3 months ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆936Updated 4 years ago