fancycode / MemoryModuleLinks
Library to load a DLL from memory.
☆3,045Updated last year
Alternatives and similar repositories for MemoryModule
Users that are interested in MemoryModule are comparing it to the libraries listed below
Sorting:
- Hook system calls, context switches, page faults and more.☆2,594Updated 2 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,113Updated 3 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆5,223Updated last week
- Windows memory hacking library☆5,242Updated last year
- C++20, x86/x64 Hooking Libary v2.0☆1,777Updated 3 weeks ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,962Updated 3 years ago
- Hiding kernel-driver for x86/x64.☆2,487Updated last month
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,830Updated 2 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆987Updated 2 years ago
- Windows Object Explorer 64-bit☆1,828Updated 3 weeks ago
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,766Updated last year
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,291Updated 5 months ago
- EasyHook - The reinvention of Windows API Hooking☆3,225Updated last year
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,254Updated last year
- Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.☆5,980Updated 2 weeks ago
- A Windows API hooking library☆754Updated 4 years ago
- Obfuscation library based on C++20 and metaprogramming☆1,557Updated last month
- x86/x64 C++ Hooking Library☆918Updated 5 years ago
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆3,863Updated last year
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,426Updated 5 months ago
- Windows NT Syscall tables☆1,335Updated last month
- heavily vectorized c++17 compile time string encryption.☆1,376Updated 3 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,154Updated 6 years ago
- Native API header files for the System Informer project.☆1,277Updated 5 months ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆565Updated 4 months ago
- Kernel Driver Utility☆2,268Updated last week
- Run a Exe File (PE Module) in memory (like an Application Loader)☆925Updated 4 years ago
- A free but powerful Windows kernel research tool.☆2,604Updated last year
- PE Tools - Portable executable (PE) manipulation toolkit☆1,138Updated this week
- windows kernel security development☆2,045Updated 3 years ago