yikesoftware / Remote_DLL_InjectionLinks
Windows下的简易进程DLL注入工具 (A simple process DLL injection tool under the Windows)
☆27Updated 4 years ago
Alternatives and similar repositories for Remote_DLL_Injection
Users that are interested in Remote_DLL_Injection are comparing it to the libraries listed below
Sorting:
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 4 years ago
- Wow64 Heaven's Gate Hook☆29Updated 4 years ago
- 关于intel和amd指令行为不一样这件事☆60Updated 3 years ago
- 参考taviso的代码逆向一下mpengine.dll☆20Updated 3 years ago
- IDA plugin for COM☆48Updated 3 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆35Updated 4 years ago
- sc4cpp is a shellcode framework based on C++☆94Updated 4 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆46Updated 6 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆38Updated 10 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Updated 7 years ago
- shellcode注入测试工具☆51Updated 6 years ago
- 通过重造轮子和调用OpenSSL的方式学习密码!!☆15Updated 2 years ago
- x64HOOK库☆18Updated 5 years ago
- ☆25Updated 3 years ago
- From 32-bit process to 64-bit process☆69Updated 4 years ago
- ☆55Updated 8 years ago
- x86/x64 dll injector☆31Updated 3 years ago
- a code virtualizer based on angr☆32Updated 2 years ago
- Windows CVE主防(HIPS/HIDS)☆56Updated 4 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆75Updated 4 years ago
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告)☆15Updated 6 years ago
- A simple program to obfuscate code written in cpp.☆51Updated last year
- intel vt-x hypervisor ept☆24Updated 5 years ago
- upx静态脱壳机源码☆18Updated 7 years ago
- ida提取特征码脚本☆56Updated 6 years ago
- Call NtCreateUserProcess directly as normal.☆75Updated 3 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆39Updated 2 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 5 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- Windows Sandbox Framework☆40Updated 3 years ago