saeedirha / DLL-Injector
Injecting DLL to Target Process. Using C++ in Windows
☆65Updated 3 years ago
Related projects: ⓘ
- Detect manualmapped images remotely, without hassle☆155Updated 6 years ago
- User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.☆87Updated 2 years ago
- A simple project to demonstrate function hooking / detouring☆124Updated 7 years ago
- ☆160Updated 7 years ago
- a DLL that will show a MessageBox with the message, "Hello world!"☆74Updated 6 years ago
- Manual DLL Injector using Thread Hijacking.☆225Updated 6 years ago
- A simple program to demonstrate external signature scanning.☆68Updated 2 years ago
- Elevate a process to be a protected process☆140Updated 5 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆225Updated 5 years ago
- An Open Source Windows DLL Injector With All Known Techniques Available☆82Updated 6 years ago
- A simple Dll Injection demonstration☆120Updated 7 years ago
- A Simple demonstration of manual dll injector☆197Updated 3 years ago
- BattlEye compatible injector, done completely from user-mode, project by secret.club☆235Updated 3 years ago
- Kernel mode driver for reading/writing process memory. C/Win32.☆269Updated 6 years ago
- ☆239Updated this week
- Capcom driver exploit wrapper☆121Updated 5 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆70Updated 11 months ago
- My Proof of Concept code for different publicly disclosed vulnerabilities☆45Updated 4 months ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆100Updated last year
- ☆78Updated this week
- A simple constexpr string literal obfuscator.☆113Updated 6 years ago
- A quick-and-dirty anti-hook library proof of concept.☆100Updated 6 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆81Updated 5 years ago
- ☆89Updated this week
- C++17 PE manualmapper☆244Updated 2 years ago
- Windows kernel samples☆243Updated 5 years ago
- Hide function calls to prevent reverse-engineering☆64Updated 3 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆62Updated last year
- Al-khaser is a PoC malware with good intentions that aimes to stress your malware analysis / sandbox environement☆30Updated 10 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆195Updated 3 years ago