Some ways to inject a DLL into a alive process
☆364Apr 26, 2018Updated 8 years ago
Alternatives and similar repositories for ProcessInjection
Users that are interested in ProcessInjection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Process Doppelgänging☆162Dec 19, 2017Updated 8 years ago
- 在Windows环境下的进程注入方法:远程线程注入、创建进程挂起注入、反射注入、APCInject、SetWindowHookEX注入☆672Sep 22, 2018Updated 7 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,269Sep 3, 2022Updated 3 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- pseudo-code to show how to disable patchguard with win10☆296Jan 13, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆539Jun 28, 2019Updated 6 years ago
- 💉 DLL/Shellcode injection techniques☆715Mar 26, 2019Updated 7 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆1,006Jan 17, 2023Updated 3 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- A collection of injection via vc++ in ring3☆243Apr 3, 2017Updated 9 years ago
- 使用纯C/C++编写的ShellCode生成框架☆454May 25, 2019Updated 6 years ago
- ☆174Sep 9, 2020Updated 5 years ago
- 逆向火绒安全软件驱动——sysdiag☆159Jan 15, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技…☆1,025Nov 10, 2021Updated 4 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 8 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆585Apr 18, 2026Updated last week
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,519Nov 15, 2023Updated 2 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- LDE64 (relocatable) source code☆103Jun 24, 2015Updated 10 years ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,037Apr 21, 2022Updated 4 years ago
- Windows memory hacking library☆5,403Jan 26, 2024Updated 2 years ago
- Library to load a DLL from memory.☆3,123Jan 3, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆48Nov 7, 2018Updated 7 years ago
- ☆124May 23, 2020Updated 5 years ago
- Hook system calls, context switches, page faults and more.☆2,646May 9, 2023Updated 2 years ago
- AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that can detect,anal…☆1,113Apr 22, 2021Updated 5 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,371Jan 22, 2022Updated 4 years ago
- dll转shellcode工具☆105Feb 20, 2020Updated 6 years ago
- PE(compressed dll) memory loader using nt api☆46Jul 3, 2017Updated 8 years ago
- source code☆183May 6, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- X86 version of syswhispers2 / x86 direct system call☆331Jan 28, 2021Updated 5 years ago
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆480Aug 31, 2021Updated 4 years ago
- Hide Driver By MiProcessLoaderEntry☆293May 17, 2019Updated 6 years ago
- An attempt at Process Doppelgänging☆184Dec 21, 2017Updated 8 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,286Apr 2, 2026Updated 3 weeks ago
- Collection Of Anti-Debugging Tricks☆100Dec 19, 2015Updated 10 years ago
- An Attempt to Bypass Memory Scanners By Misusing the ntdll.dll "RT" Section.☆100Jan 3, 2016Updated 10 years ago