m417z / global-inject-demoView external linksLinks
A global injection and hooking example
☆169Oct 20, 2023Updated 2 years ago
Alternatives and similar repositories for global-inject-demo
Users that are interested in global-inject-demo are comparing it to the libraries listed below
Sorting:
- Overwrite a process's recovery callback and execute with WER☆103Apr 17, 2022Updated 3 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆298May 12, 2023Updated 2 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- ☆208Apr 5, 2022Updated 3 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- ☆153Jul 31, 2022Updated 3 years ago
- ☆55Nov 11, 2021Updated 4 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- ☆78Oct 18, 2022Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆235Oct 18, 2022Updated 3 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Tools and PoCs for Windows syscall investigation.☆368Dec 2, 2025Updated 2 months ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆373May 24, 2022Updated 3 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆136Jan 2, 2023Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 4 years ago
- ☆149Jun 5, 2023Updated 2 years ago
- LdrLoadDll Unhooking☆135Jan 16, 2022Updated 4 years ago
- ☆57Jan 15, 2024Updated 2 years ago
- ☆504Aug 14, 2022Updated 3 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Jun 21, 2025Updated 7 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- ☆52Apr 1, 2022Updated 3 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,269May 1, 2024Updated last year
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆587Jan 24, 2023Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆96Aug 11, 2021Updated 4 years ago
- Native code virtualizer for x64 binaries☆515Dec 20, 2024Updated last year
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated last year
- Sysmon-Like research tool for ETW☆384Nov 15, 2022Updated 3 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆310Feb 13, 2023Updated 3 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Clone running process with ZwCreateProcess☆59Nov 8, 2020Updated 5 years ago