misaleh / patchyaLinks
Run-time loader and patcher
☆15Updated 7 years ago
Alternatives and similar repositories for patchya
Users that are interested in patchya are comparing it to the libraries listed below
Sorting:
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 6 years ago
- Infects PE files with a shellcode☆22Updated 7 years ago
- Execute an arbitrary command within the context of another process☆21Updated 6 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- Code Integrity Violation Spotter☆17Updated last year
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 5 years ago
- Dump mapped PE files from memory to the disk☆20Updated 6 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26Updated 2 years ago
- Yet another Windows DLL injector.☆40Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆38Updated 6 years ago
- A kernel mode Windows rootkit in development.☆49Updated 4 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆48Updated 3 years ago
- ☆26Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 3 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 6 years ago
- ☆17Updated 5 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆41Updated 9 years ago
- An example of PE hollowing injection technique☆25Updated 6 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Updated 4 years ago
- Code Injection technique written in cpp language☆34Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- An API Monitor based on Instrumentation☆44Updated 8 years ago
- A class to gather information about a process, its threads and modules.☆23Updated 5 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 8 months ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 6 years ago
- ☆20Updated 6 years ago