myfreeer / dll-hijack
DLL hijack codes for cmake on windows.
☆23Updated last year
Related projects ⓘ
Alternatives and complementary repositories for dll-hijack
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆52Updated last year
- A simple commandline injector using classic DLL injection☆137Updated 2 years ago
- hooking winsock send & recv in order to read all traffic of a process☆43Updated 6 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- Execute commands as local system.☆61Updated 5 years ago
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆114Updated 3 years ago
- VMProtect Leaked Source Code☆24Updated last year
- Dump .net assembly from a native loader which uses ClrCreateinstance☆53Updated 2 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆103Updated last year
- Hide function calls to prevent reverse-engineering☆65Updated 3 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆146Updated 2 years ago
- Detects virtual machines and malware analysis environments☆115Updated 2 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆53Updated 3 years ago
- Inject a Dll from memory☆41Updated 5 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆71Updated last year
- Header only library for obfuscation import winapi functions.☆32Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆92Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆39Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆261Updated last month
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆101Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆43Updated 2 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆114Updated 9 months ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆26Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆226Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆52Updated 9 months ago
- One DLL to redirect them all to a SOCKS5 server.☆41Updated 9 months ago
- Simple NtQuerySystemInformation hook for your hacking apps.☆41Updated 3 years ago
- The BEST DLL Injector Library.☆21Updated 2 months ago