yikesoftware / Remote_DLL_InjectionLinks
Windows下的简易进程DLL注入工具 (A simple process DLL injection tool under the Windows)
☆27Updated 3 years ago
Alternatives and similar repositories for Remote_DLL_Injection
Users that are interested in Remote_DLL_Injection are comparing it to the libraries listed below
Sorting:
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 4 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆38Updated 10 years ago
- IDA plugin for COM☆48Updated 3 years ago
- 关于intel和amd指令行为不一样这件事☆60Updated 3 years ago
- Wow64 Heaven's Gate Hook☆28Updated 4 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆46Updated 6 years ago
- 参考taviso的代码逆向一下mpengine.dll☆20Updated 3 years ago
- shellcode注入测试工具☆51Updated 6 years ago
- sc4cpp is a shellcode framework based on C++☆92Updated 4 years ago
- intel vt-x hypervisor ept☆24Updated 5 years ago
- ☆55Updated 8 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- 过TP驱动☆28Updated 5 years ago
- 一个32位windows下x86指令集的代码扭曲加密小工具☆32Updated 6 years ago
- fork from A-Protect☆10Updated 6 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆35Updated 4 years ago
- From 32-bit process to 64-bit process☆69Updated 4 years ago
- ☆11Updated 3 years ago
- ☆25Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆75Updated 3 years ago
- ☆33Updated 4 years ago
- Windows CVE主防(HIPS/HIDS)☆56Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- inject dll from kernal mode to user mode process use Apc☆33Updated 5 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆38Updated 2 years ago
- x64HOOK库☆18Updated 5 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- May the POC be with you☆63Updated 2 months ago
- x86/x64 dll injector☆31Updated 3 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Updated 2 years ago