Fast Conversion Windows Dynamic Link Library To ShellCode
☆420Mar 10, 2022Updated 3 years ago
Alternatives and similar repositories for DllToShellCode
Users that are interested in DllToShellCode are comparing it to the libraries listed below
Sorting:
- Rapid generation ShellCode☆60Sep 12, 2017Updated 8 years ago
- 使用纯C/C++编写的ShellCode生成框架☆452May 25, 2019Updated 6 years ago
- Converts PE into a shellcode☆2,745Aug 30, 2025Updated 5 months ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- modify from memorymodule. support exception☆223Oct 22, 2020Updated 5 years ago
- Shellcode Compiler☆1,149Sep 1, 2024Updated last year
- Just another Windows Process Injection☆408Aug 7, 2020Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,503Nov 15, 2023Updated 2 years ago
- Reverse engineered source code of the autochk rootkit☆209Nov 1, 2019Updated 6 years ago
- 绕3环的shellcode免杀框架☆574Mar 19, 2021Updated 4 years ago
- Shellcode to load an appended Dll☆91Oct 28, 2020Updated 5 years ago
- SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技…☆1,019Nov 10, 2021Updated 4 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆533Jul 2, 2025Updated 7 months ago
- 加载内存当中的DLL文件☆83Aug 1, 2018Updated 7 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,255Aug 27, 2023Updated 2 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- MemoryModule which compatible with Win32 API and support exception handling☆448Feb 11, 2025Updated last year
- From 32-bit process to 64-bit process☆68Apr 17, 2021Updated 4 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆341Jul 30, 2017Updated 8 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆536Jun 28, 2019Updated 6 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆940Mar 28, 2021Updated 4 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆807Jul 6, 2020Updated 5 years ago
- Position Independent Windows Shellcode Written in C☆296Aug 28, 2018Updated 7 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆1,174Oct 22, 2021Updated 4 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆581Feb 8, 2026Updated 2 weeks ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,270May 1, 2024Updated last year
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆718Jul 19, 2023Updated 2 years ago
- ☆208Apr 5, 2022Updated 3 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated last year
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- shellcode 生成框架☆290Mar 23, 2022Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆239Dec 7, 2020Updated 5 years ago