notscimmy / libinjectLinks
Currently supports injecting signed/unsigned DLLs in 64-bit processes
☆63Updated 4 years ago
Alternatives and similar repositories for libinject
Users that are interested in libinject are comparing it to the libraries listed below
Sorting:
- ☆38Updated 8 years ago
- Capcom wrapper with safety in mind.☆79Updated 7 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- A simple kernel-level plugin for ReClass.NET☆36Updated 7 years ago
- Manual PE image mapper☆65Updated 11 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Communication via callback☆73Updated 5 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆84Updated 4 years ago
- ☆49Updated 6 years ago
- Some garbage drivers written for getting started☆65Updated 5 years ago
- ☆36Updated 4 years ago
- Discarded Section Manual Map☆68Updated 4 years ago
- Disable Driver Callbacks☆105Updated 7 years ago
- My take on the capcom driver vulnerability☆28Updated 7 years ago
- Modify process handle permissions☆60Updated 8 years ago
- A client-sided anti-cheat developed during a freelance project to "plug-in" to a proprietary client for a private server. Includes memory…☆58Updated 4 years ago
- Intercepting DeviceControl via WPP☆133Updated 5 years ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- BetaShield Windows x86 Ring3 Anticheat v2☆38Updated 8 years ago
- driver manual mapper☆28Updated 5 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆46Updated 4 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆54Updated 6 years ago
- ☆31Updated 6 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- x64 syscall caller in C++.☆90Updated 6 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- driver interface with dll-injection capabilities☆28Updated 4 years ago