fancycode / MemoryModuleLinks
Library to load a DLL from memory.
☆2,984Updated last year
Alternatives and similar repositories for MemoryModule
Users that are interested in MemoryModule are comparing it to the libraries listed below
Sorting:
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆2,988Updated 2 years ago
- Windows memory hacking library☆5,156Updated last year
- C++20, x86/x64 Hooking Libary v2.0☆1,726Updated this week
- Hook system calls, context switches, page faults and more.☆2,559Updated 2 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆983Updated 2 years ago
- Windows Object Explorer 64-bit☆1,781Updated 2 weeks ago
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,366Updated 2 months ago
- Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.☆5,789Updated 3 weeks ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,241Updated last month
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,747Updated last year
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,781Updated last year
- The Minimalistic x86/x64 API Hooking Library for Windows☆4,967Updated last month
- Obfuscation library based on C++11/14 and metaprogramming☆1,483Updated 2 years ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,925Updated 2 years ago
- Hiding kernel-driver for x86/x64.☆2,390Updated last month
- Windows NT Syscall tables☆1,302Updated last week
- x86/x64 C++ Hooking Library☆913Updated 5 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,232Updated last year
- Native API header files for the System Informer project.☆1,210Updated last month
- EasyHook - The reinvention of Windows API Hooking☆3,182Updated last year
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆555Updated last month
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆3,753Updated last year
- heavily vectorized c++17 compile time string encryption.☆1,327Updated 3 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,129Updated 5 years ago
- A Windows API hooking library☆749Updated 4 years ago
- A free but powerful Windows kernel research tool.☆2,560Updated 8 months ago
- PE Tools - Portable executable (PE) manipulation toolkit☆1,109Updated 7 years ago
- Protected Processes Light Killer☆938Updated 2 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆911Updated 4 years ago
- Principled, lightweight C/C++ PE parser☆850Updated 7 months ago