killeven / DllToShellCodeLinks
Fast Conversion Windows Dynamic Link Library To ShellCode
☆401Updated 3 years ago
Alternatives and similar repositories for DllToShellCode
Users that are interested in DllToShellCode are comparing it to the libraries listed below
Sorting:
- Some ways to inject a DLL into a alive process☆361Updated 7 years ago
- Hide Driver By MiProcessLoaderEntry☆287Updated 6 years ago
- A collection of injection via vc++ in ring3☆242Updated 8 years ago
- Asynchronous Procedure Calls☆232Updated 4 years ago
- dll转shellcode工具☆102Updated 5 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆236Updated 4 months ago
- Reflective PE loader for DLL injection☆178Updated 7 years ago
- System call hook for Windows 10 20H1☆493Updated 3 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆553Updated 2 weeks ago
- X86 version of syswhispers2 / x86 direct system call☆325Updated 4 years ago
- pseudo-code to show how to disable patchguard with win10☆296Updated 7 years ago
- VMProtect 3.x Anti-debug Method Improved☆595Updated 6 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆330Updated 7 years ago
- ☆111Updated 5 years ago
- InfinityHookPro Win7 -> Win11 latest☆531Updated 2 years ago
- Process Doppelgänging☆158Updated 7 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆525Updated 5 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆439Updated 4 years ago
- hijack dll Source Code Generator. support x86/x64☆807Updated 4 years ago
- 💉 全能进程注入器 [Yet Another Process Injector] that reduce differences between x64, wow64 and x86 processes.☆282Updated 2 years ago
- PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including…☆534Updated 5 years ago
- 🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engine…☆344Updated 8 months ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,203Updated last year
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆242Updated last year
- LLVM Obfuscator / constexpr / PEB CALL API☆178Updated 6 years ago
- Radical Windows ARK☆238Updated 2 months ago
- In-Memory PE Loader☆377Updated 5 years ago
- modify from memorymodule. support exception☆219Updated 4 years ago
- shellcode 生成框架☆266Updated 3 years ago
- Position Independent Windows Shellcode Written in C☆292Updated 6 years ago