magnusstubman / dll-exportsLinks
Collection of DLL function export forwards for DLL export function proxying
☆98Updated last year
Alternatives and similar repositories for dll-exports
Users that are interested in dll-exports are comparing it to the libraries listed below
Sorting:
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆111Updated 3 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆87Updated 2 months ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆63Updated 9 months ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆118Updated 2 years ago
- ☆200Updated 3 years ago
- Windows API Call Obfuscation☆106Updated 2 years ago
- PoC capable of detecting manual syscalls from usermode.☆197Updated 7 months ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆106Updated 4 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆214Updated 2 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆217Updated last year
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 4 years ago
- ☆113Updated 2 years ago
- Finding Truth in the Shadows☆107Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆232Updated 11 months ago
- Reverse engineering winapi function loadlibrary.☆202Updated 2 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆52Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆76Updated 3 years ago
- A quick-and-dirty anti-hook library proof of concept.☆104Updated 6 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆248Updated 2 years ago
- Add an empty section to a PE file☆51Updated 7 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆77Updated last month
- CreateRemoteThread: how to pass multiple parameters to the remote thread function without shellcode.