kmaork / pyinjector
Inject shared libraries into running processes
☆92Updated 5 months ago
Alternatives and similar repositories for pyinjector:
Users that are interested in pyinjector are comparing it to the libraries listed below
- Inject python code into a running python process☆90Updated 5 months ago
- PyInjector - Inject Python code into python process.☆187Updated 8 months ago
- Python obfuscator built on LibCST with a library of fun obfuscation techniques, including polynomial MBAs, runtime bytecode patching, etc…☆41Updated 6 months ago
- Tool to extract nuitka compiled executables☆86Updated 8 months ago
- Python process code injection for Windows.☆34Updated 2 years ago
- dnSpy but for Python☆77Updated 2 years ago
- Tool to assist during manual decompilation of Python bytecode☆44Updated last year
- VMProtect 2.x-3.x x64 Import Deobfuscator☆286Updated last year
- Protect Your Python Files☆38Updated last month
- kernel mode spoofer disk and smbios, socket communication☆145Updated 2 years ago
- ☆166Updated 4 years ago
- A kernel driver for reading and writing memory☆281Updated last year
- A tool for hooking Windows applications and jumping to your Python code with the injected Python interpreter☆52Updated last year
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆161Updated 2 years ago
- Windows Kernel inject (no module no thread)☆269Updated 2 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆439Updated 2 years ago
- Fumo Loader - All in one kernel-based DLL injector☆282Updated last month
- Drawing from kernelmode without any hooks☆161Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆323Updated 2 years ago
- Kernel mode driver for reading/writing process memory. C/Win32.☆282Updated 6 years ago
- undetected eac mapper☆162Updated 2 years ago
- Unpacking VMProtected Executable Guide☆114Updated 4 years ago
- This module can read and write to the memory of any process on Windows.☆154Updated last year
- C++ 17 or higher control flow obfuscation library for windows binaries☆337Updated 5 months ago
- State of the art DLL injector that took 20 minutes to make☆209Updated last year
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆302Updated 3 years ago
- A simple DLL to bypass the anti debugging methods from GH Anti Debugging with explanation☆48Updated 4 years ago
- Kernel mode to user mode dll injection☆235Updated 3 years ago
- Just a external cheat source for Fortnite with a kernel driver (using data pointer communication)☆111Updated last year
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆121Updated 3 years ago