ohjeongwook / LoadDLL
Windows DLL Loading Utility
☆11Updated 4 years ago
Alternatives and similar repositories for LoadDLL:
Users that are interested in LoadDLL are comparing it to the libraries listed below
- Kernel mode windows NT API logger☆22Updated 5 years ago
- User-mode part of Zerokit platform☆20Updated 5 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- Zerokit shared code☆16Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆36Updated 6 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- ☆22Updated 3 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 4 months ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- Reflective DLL Injection style process infector☆20Updated 6 years ago
- DLL injector. Catch process by name, quickly inject...☆11Updated 4 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆16Updated 6 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- ☆33Updated 7 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 6 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 9 years ago
- Zerokit server controller☆13Updated 5 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆22Updated 6 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆31Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago