lewisclark / jector
Configurable library & executable to inject Windows dynamic-link libraries (DLLs) into processes
☆21Updated 3 years ago
Alternatives and similar repositories for jector:
Users that are interested in jector are comparing it to the libraries listed below
- Shellcode execution for memflow☆13Updated 2 years ago
- A VMWare logger using built-in backdoor.☆27Updated 4 months ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 2 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Updated 2 years ago
- old sdk for csgo written in rust☆12Updated last year
- A tiny code that performs kernel-mode read/write using CVE-2023-38817.☆14Updated 10 months ago
- Rust implementation of lazy_importer☆47Updated last year
- Rust bindings for VMProtect.☆25Updated 11 months ago
- Simple manual mapper written in Rust.☆13Updated 8 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- ☆19Updated 2 years ago
- Compileable POC of namazso's x64 return address spoofer.☆51Updated 4 years ago
- A proof-of-concept to abuse EQU8 anti-cheat kernel driver☆14Updated 3 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆33Updated last year
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 2 years ago
- ☆37Updated 3 years ago
- Process hiding library☆19Updated 4 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆76Updated last year
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆44Updated last week
- ☆37Updated last year
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆20Updated last year
- Scan for potentially vulnerable drivers☆83Updated 2 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- ☆58Updated 2 years ago
- a parser for the .map file included in the aimware leak☆17Updated 2 years ago