fancycode / MemoryModuleLinks
Library to load a DLL from memory.
☆3,083Updated 2 years ago
Alternatives and similar repositories for MemoryModule
Users that are interested in MemoryModule are comparing it to the libraries listed below
Sorting:
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,195Updated 3 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆5,446Updated 2 months ago
- Windows Object Explorer 64-bit☆1,865Updated 3 weeks ago
- Hook system calls, context switches, page faults and more.☆2,620Updated 2 years ago
- Windows memory hacking library☆5,304Updated last year
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,995Updated 3 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆994Updated 2 years ago
- C++20, x86/x64 Hooking Libary v2.0☆1,803Updated last month
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,317Updated 2 months ago
- A Windows API hooking library☆757Updated 4 years ago
- Obfuscation library based on C++20 and metaprogramming☆1,650Updated 2 weeks ago
- Native API header files for the System Informer project.☆1,314Updated 7 months ago
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,491Updated 2 weeks ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,873Updated 2 years ago
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,789Updated 2 years ago
- Windows NT Syscall tables☆1,375Updated 2 weeks ago
- Hiding kernel-driver for x86/x64.☆2,579Updated 4 months ago
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆3,950Updated last year
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,259Updated last year
- PE Tools - Portable executable (PE) manipulation toolkit☆1,157Updated 2 months ago
- Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.☆6,100Updated last month
- EasyHook - The reinvention of Windows API Hooking☆3,258Updated last year
- A free but powerful Windows kernel research tool.☆2,638Updated last month
- windows kernel security development☆2,052Updated 3 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆574Updated 7 months ago
- x86/x64 C++ Hooking Library☆922Updated 5 years ago
- xAnalyzer plugin for x64dbg☆1,168Updated 5 months ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆934Updated 4 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,177Updated 6 years ago
- heavily vectorized c++17 compile time string encryption.☆1,397Updated 4 years ago