nettitude / DLLInjectionLinks
DLL Injection Library & Tools
☆71Updated 9 years ago
Alternatives and similar repositories for DLLInjection
Users that are interested in DLLInjection are comparing it to the libraries listed below
Sorting:
- ☆52Updated 8 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Ring3 Rootkit Backdoor.☆42Updated 9 years ago
- ☆45Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- Evil Reflective DLL Injection Finder☆47Updated 6 years ago
- Gozi-MBR-rootkit Bootkit Modified☆70Updated 8 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆32Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Blog posts☆30Updated 4 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Process reimaging proof of concept code☆96Updated 6 years ago
- Windows Inline function hooking library targeted at MSVC☆27Updated 8 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- C++☆80Updated 8 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 10 months ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆96Updated 4 years ago
- ☆49Updated 5 years ago
- Load a Windows Kernel Driver☆92Updated 8 years ago
- Shellcode Of Death☆38Updated 11 years ago
- The exploit for Panda AV LPE☆37Updated 6 years ago