kevinalmansa / DLL_Wrapper_ExampleLinks
Example of an over all attack using DLL_Wrapper.
☆11Updated 8 years ago
Alternatives and similar repositories for DLL_Wrapper_Example
Users that are interested in DLL_Wrapper_Example are comparing it to the libraries listed below
Sorting:
- A program that generates code to implement a DLL Proxy.☆70Updated 8 years ago
- ☆34Updated 7 years ago
- Add an empty section to a PE file☆53Updated 8 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- A library with four different methods to execute shellcode in a process☆26Updated 5 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆24Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆74Updated 2 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Updated 4 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆101Updated 7 years ago
- too busy for that all, furikuri is framework for code protection☆161Updated 6 years ago
- A modern, mod independent open source cheat for Enemy Territory☆70Updated 2 weeks ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆89Updated 10 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Updated 8 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- usermode standalone kernel interface☆111Updated 7 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆69Updated 6 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆75Updated last year
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 6 years ago
- A quick-and-dirty anti-hook library proof of concept.