nettitude / DLLInjectionLinks
DLL Injection Library & Tools
☆73Updated 9 years ago
Alternatives and similar repositories for DLLInjection
Users that are interested in DLLInjection are comparing it to the libraries listed below
Sorting:
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- ☆53Updated 8 years ago
- ☆45Updated 7 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Gozi-MBR-rootkit Bootkit Modified☆72Updated 8 years ago
- Shellcode Of Death☆41Updated 12 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆52Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Windows Console Monitoring☆100Updated 8 years ago
- a program to detect reflective dll injection on a live machine☆75Updated 9 years ago
- PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
- Load a Windows Kernel Driver☆94Updated 8 years ago
- Process reimaging proof of concept code☆96Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Updated 4 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆57Updated 6 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- C++☆80Updated 9 years ago
- PoC for detecting and dumping process hollowing code injection☆52Updated 6 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 6 years ago
- The exploit for Panda AV LPE☆37Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53Updated 5 years ago