kimtg / WinHttpExampleLinks
WinHTTP example
☆17Updated 9 years ago
Alternatives and similar repositories for WinHttpExample
Users that are interested in WinHttpExample are comparing it to the libraries listed below
Sorting:
- Protected Process Light Library☆18Updated 4 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Updated 5 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- Library for using direct system calls☆35Updated 4 months ago
- ☆26Updated 7 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Windows kernel driver encryption library, support base64, aes-256, rsa-2048 and higher, ecc-256, single file, minimal dependence, support…☆21Updated 4 years ago
- ☆24Updated 6 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- ☆15Updated 4 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆12Updated 5 years ago
- a network filter using NDIS hook technique☆19Updated 12 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 5 years ago
- combine the power of procmon and dbgview into one single application☆8Updated last year
- Reverse Socks5 proxy for windows☆14Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 3 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- stop any process from looking into your process by hooking.☆17Updated last year
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 8 years ago
- Header only library for obfuscation import winapi functions.☆40Updated 3 months ago
- Shh0ya Kernel Hook Driver☆22Updated 4 years ago
- Packet Injection With WFP☆13Updated 2 years ago
- x64 assembler library☆31Updated 11 months ago
- LSASS INJECTOR☆35Updated 6 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Updated 5 years ago