hz86 / peloaderLinks
内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)
☆36Updated 2 years ago
Alternatives and similar repositories for peloader
Users that are interested in peloader are comparing it to the libraries listed below
Sorting:
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆84Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- 《Windows内核编程》学习☆62Updated 4 years ago
- 保护进程☆23Updated 2 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆26Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆95Updated 2 years ago
- shellcode注入测试工具☆50Updated 6 years ago
- 以shellcode注入其它驱动执行,躲避驱动签名检测,曾pubg项目中使用,,,当然现在,,,☆26Updated 2 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- windwos内核研究与驱动Code☆66Updated 3 years ago
- 无痕注入1☆76Updated 4 years ago
- 基于sunday算法的内存快速搜索,搜索2GB内存只需1秒☆72Updated 5 years ago
- 过TP驱动☆29Updated 5 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆109Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆72Updated 3 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- 驱动加载器 -> 利用iqvw64e.sys映射驱动☆57Updated 5 years ago
- From 32-bit process to 64-bit process☆69Updated 4 years ago
- A simple program to obfuscate code written in cpp.☆51Updated last year
- 大数字驱动逆向代码☆73Updated last year
- 远程注入无导入函数dll,自动重定位以后内存加载dll☆48Updated 6 years ago
- Kill Protected Process Light Process (include av)☆58Updated last year
- dll文件加解密和内存加载☆125Updated 6 years ago
- ☆53Updated 2 years ago
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆180Updated 3 years ago
- Enum and Remove Hook in Windows☆39Updated last week
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆31Updated 5 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 3 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆72Updated 3 years ago