lewisclark / jectorLinks
Configurable library & executable to inject Windows dynamic-link libraries (DLLs) into processes
☆25Updated 4 years ago
Alternatives and similar repositories for jector
Users that are interested in jector are comparing it to the libraries listed below
Sorting:
- Fully disables & removes Windows Defender☆35Updated 3 years ago
- Just tried, unusable☆43Updated 11 months ago
- Create and find signatures in Binary Ninja☆27Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 2 years ago
- PAGE_GUARD based hooking library☆48Updated 3 years ago
- ☆36Updated 4 years ago
- Process hiding library☆19Updated 5 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆80Updated last year
- Crashes ida on static analyses.☆104Updated 5 months ago
- A collection of anti-cheat ideas☆17Updated 5 years ago
- ☆21Updated 2 years ago
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆33Updated 11 months ago
- ☆38Updated 2 years ago
- A platform independent C++ code obfuscator.☆13Updated 6 years ago
- Simple program to stream offsets for your game cheat, Was reversing some p2c and decided to recreate a better version of this function fo…☆11Updated 3 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Updated 2 years ago
- Hardware ID☆54Updated 3 years ago
- outdated memory internal imgui cs:go mod: includes internal injection with vac bypass☆38Updated last month
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆67Updated 2 years ago
- proof of concept of user-mode anti-breakpoint technique☆16Updated 2 years ago
- a DLL that will show a MessageBox with the message, "Hello world!"☆83Updated 7 years ago
- Fixes the "Device\Nal is already in use" error on kdmapper.☆20Updated 2 years ago
- C/C++ antidebugging library for Windows☆37Updated last month
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago
- x86-64 virtualizing obfuscator written in Rust☆78Updated last year
- Windows driver mapper via the UEFI☆48Updated 2 months ago
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆32Updated 3 years ago
- Manually maps a DLL & replaces a target process's entry point.☆21Updated 6 months ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆22Updated last year