hasherezade / dll_injectorLinks
A simple commandline injector using classic DLL injection
☆151Updated 2 years ago
Alternatives and similar repositories for dll_injector
Users that are interested in dll_injector are comparing it to the libraries listed below
Sorting:
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆244Updated 6 years ago
- State of the art DLL injector that took 20 minutes to make☆216Updated last year
- Simple Kernelmode DLL Injector with Manual mapping☆291Updated last year
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆322Updated 2 years ago
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆288Updated 2 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆244Updated 3 years ago
- Bypassing PatchGuard on modern x64 systems☆260Updated 2 years ago
- Load your driver like win32k.sys☆254Updated 2 years ago
- Kernel LdrLoadDll injector☆260Updated 6 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆181Updated last year
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆148Updated 11 months ago
- Windows Kernel inject (no module no thread)☆275Updated 2 years ago
- Elevate a process to be a protected process☆150Updated 5 years ago
- ☆289Updated 3 weeks ago
- DSE bypass using a leaked cert and adjusting the current clock.☆153Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆280Updated 3 years ago
- Various Process Injection Techniques☆148Updated 2 years ago
- Vectored Exception Handling Hooking Class☆158Updated 6 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆268Updated 2 years ago
- Using CVE-2023-21768 to manual map kernel mode driver☆186Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated 2 years ago
- manual map unsigned driver over signed memory☆187Updated last year
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆151Updated last year
- Manual DLL Injector using Thread Hijacking.☆238Updated 7 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆159Updated last year
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆216Updated 4 years ago
- Exploit MsIo vulnerable driver☆104Updated 3 years ago
- Kernel mode to user mode dll injection☆264Updated 4 years ago
- Unsigned driver loader using CVE-2018-19320☆273Updated 2 years ago
- Detects virtual machines and malware analysis environments☆128Updated 2 years ago