h0pe-ay / HookTechnology
记录一下Windows下的Hook技巧
☆11Updated 8 months ago
Alternatives and similar repositories for HookTechnology:
Users that are interested in HookTechnology are comparing it to the libraries listed below
- iSwordSDK (Provide Powerful Kernel API For Ring3 Applications)☆15Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆29Updated last year
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- Hide Port In Windows☆38Updated 5 months ago
- ☆20Updated 11 months ago
- ☆17Updated 4 years ago
- This is a project to receive Base64 data and decode it in process☆15Updated 5 years ago
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆15Updated last year
- ☆10Updated 2 years ago
- 关闭恶意驱动的文件和注册表保护☆12Updated 2 years ago
- Change hash for a signed pe☆16Updated last year
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Updated 3 years ago
- Add export function and convert exe to dll☆25Updated 4 years ago
- 非涉密源码☆19Updated last year
- Process Hollowing Packer☆26Updated 7 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 9 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆12Updated 4 years ago
- ☆9Updated last year
- 一款linux下的安全产品目的是满足个人安全需求有SSH爆破防护和SYN攻击扫描防护功能,基于netfilter,☆19Updated last year
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated 2 months ago
- Load the evilDLL from socket connection without touch disk☆16Updated 3 years ago
- ☆16Updated 3 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆27Updated 3 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- 优化了GetSystemEarlyBird的代码结构☆21Updated 4 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 2 years ago
- ☆32Updated 4 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Updated 4 years ago