sud01oo / ProcessInjection
Some ways to inject a DLL into a alive process
☆359Updated 6 years ago
Alternatives and similar repositories for ProcessInjection:
Users that are interested in ProcessInjection are comparing it to the libraries listed below
- Fast Conversion Windows Dynamic Link Library To ShellCode☆393Updated 3 years ago
- Hide Driver By MiProcessLoaderEntry☆286Updated 5 years ago
- open-source x86/x64 usermode anti-anti-debug plugin☆222Updated 5 years ago
- 💉 全能进程注入器 [Yet Another Process Injector] that reduce differences between x64, wow64 and x86 processes.☆280Updated 2 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆544Updated last year
- pseudo-code to show how to disable patchguard with win10☆296Updated 7 years ago
- VMProtect 3.x Anti-debug Method Improved☆563Updated 5 years ago
- A collection of injection via vc++ in ring3☆242Updated 7 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆736Updated 7 years ago
- Windows Ark 工具的工程和一些demo☆189Updated 9 years ago
- 在Windows环境下的进程注入方法:远程线程注入、创建进程挂起注入、反射注入、APCInject、SetWindowHookEX注入☆653Updated 6 years ago
- hijack dll Source Code Generator. support x86/x64☆786Updated 4 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆435Updated 4 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆520Updated 5 years ago
- InfinityHookPro Win7 -> Win11 latest☆516Updated 2 years ago
- SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技…☆938Updated 3 years ago
- Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.☆829Updated 10 months ago
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆462Updated 3 years ago
- 30种方法检测程序是否被调试☆332Updated 5 years ago
- 逆向火绒安全软件驱动——sysdiag☆153Updated 7 years ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager☆665Updated 6 years ago
- ☆143Updated 4 years ago
- dll转shellcode工具☆100Updated 5 years ago
- LLVM Obfuscator / constexpr / PEB CALL API☆176Updated 6 years ago
- System call hook for Windows 10 20H1☆484Updated 3 years ago
- Fake DLL Source Code Generator☆229Updated 10 years ago
- Asynchronous Procedure Calls☆219Updated 3 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆960Updated 2 years ago
- Position Independent Windows Shellcode Written in C☆289Updated 6 years ago
- Windows NT x64 syscall fuzzer☆596Updated last year