xingyun86 / InjectWorkerLinks
Windows inject
☆16Updated 7 years ago
Alternatives and similar repositories for InjectWorker
Users that are interested in InjectWorker are comparing it to the libraries listed below
Sorting:
- wow64 syscall filter☆13Updated 10 years ago
- Ssdt Hook Detection tool☆13Updated 8 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆17Updated 12 years ago
- ☆12Updated 10 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- A c++, QT gui based memory engine☆13Updated 7 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Updated 11 years ago
- ☆16Updated 9 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- ☆14Updated 10 years ago
- windows kernel File redirection☆20Updated 11 years ago
- an efficient yet easy to use network packet builder and parser☆11Updated 8 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆35Updated 8 years ago
- ☆15Updated 7 years ago
- 对windows-api内容进行自动审查和过滤监控☆14Updated 8 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆13Updated 10 years ago
- ☆11Updated 11 years ago
- PE Infector/Cryptor source code☆16Updated 8 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- midfunction d3d basehook for winxp, win7, win8, win10☆17Updated 6 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- An analytical debugger programmed in C++, using Qt.☆21Updated 13 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- Windows device tree walker☆15Updated 7 years ago
- ☆12Updated 8 years ago
- ☆24Updated 5 years ago
- ☆19Updated 10 years ago
- Common Malware Techniques☆13Updated 2 years ago