tbhaxor / Win-LoadLibraryLinks
Demo of LoadLibrary function with C++ in Win32 API
☆11Updated 2 years ago
Alternatives and similar repositories for Win-LoadLibrary
Users that are interested in Win-LoadLibrary are comparing it to the libraries listed below
Sorting:
- A dll injector static library for Win x64 processes with handle elevation supported☆12Updated 4 years ago
- C++ library for low-level Windows development☆81Updated last year
- Small memory leak PoC that is happening in IopGetDeviceInterfaces☆25Updated 5 years ago
- ☆58Updated 2 months ago
- Debug Print viewer (user and kernel)☆71Updated 2 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆55Updated 2 years ago
- Modern UI controls for win64 assembler☆31Updated 2 years ago
- Signature scanner and API hooks to detect malicious process injection☆29Updated 2 years ago
- A simple password-based PE encryptor for Windows 32-bit executables.☆51Updated last year
- Two PoC of accessing process virtual memory via NT Kernel☆22Updated 4 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Updated 6 years ago
- Hide function calls to prevent reverse-engineering☆74Updated 4 years ago
- Samples from my book Windows Native API programming☆80Updated 8 months ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆77Updated last year
- cross platform library to manipulate and extract information of memory regions☆34Updated 7 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Updated 6 months ago
- Add an empty section to a PE file☆53Updated 8 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Updated 4 years ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtime☆45Updated 10 months ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22Updated 4 years ago
- D☆44Updated 4 years ago
- This is a simple tool to remove the "Rich" header from binaries (EXE or DLL files) created by M$ development tools.☆34Updated 5 years ago
- View Windows System in action☆45Updated 6 months ago
- ☆40Updated 8 months ago
- An implementation of the Process Hollowing technique.☆16Updated 5 years ago
- Shows different icons for 64 and 32-bit DLLs. Register with RegSvr32 to install☆38Updated last year
- LPC (Local Procedure Call) is a portion of Windows NT kernel, used for fast communication between threads or processes. It can be also us…☆15Updated 4 years ago
- VExtension for NTCore Explorer Suite aka CFF Explorer☆40Updated 3 years ago