ohjeongwook / LoadDLLLinks
Windows DLL Loading Utility
☆12Updated 5 years ago
Alternatives and similar repositories for LoadDLL
Users that are interested in LoadDLL are comparing it to the libraries listed below
Sorting:
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- ☆33Updated 10 years ago
- ☆45Updated 7 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Various Crypter Project☆52Updated 11 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆52Updated 7 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- Shellcode Of Death☆39Updated 12 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 11 months ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- DLL Injection Library & Tools☆72Updated 9 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- A simple reflective dll example☆19Updated 8 years ago
- ☆36Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 8 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Blog posts☆30Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- ☆36Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 9 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆20Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Extend WSH functionality with Registration-Free COM☆26Updated 8 years ago