ytk2128 / dll-mergerLinks
A simple tool for merging DLLs into executables with PEB-invisible mapping.
☆288Updated last year
Alternatives and similar repositories for dll-merger
Users that are interested in dll-merger are comparing it to the libraries listed below
Sorting:
- A Windows PE format file loader☆151Updated 7 years ago
- Collection of undocumented Windows API declarations.☆339Updated 3 months ago
- 🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engine…☆354Updated last year
- A modern c++ implementation of windows heavens gate☆242Updated 5 years ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆182Updated 3 years ago
- Executes 64bit code from a 32bit process☆240Updated 8 years ago
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆297Updated 2 years ago
- Creates a proxy dll which sits between the game and original dll☆146Updated 10 months ago
- Collection of DLL function export forwards for DLL export function proxying☆107Updated 4 months ago
- MemoryModule which compatible with Win32 API and support exception handling☆443Updated 11 months ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 5 years ago
- A bunch of parsers for PE and PDB formats in C++☆263Updated last year
- A Cross-Platform C++ parser library for Windows user minidumps with Python 3 bindings.☆224Updated 3 months ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆316Updated last year
- In-Memory PE Loader☆375Updated 6 years ago
- Yet another PE Viewer☆142Updated 3 years ago
- Authenticode Hash Calculator for PE32/PE32+ files☆120Updated 6 months ago
- A header-only C++ library for accessing files in COFF binary format. (Including Windows PE/PE+ formats)☆208Updated 4 months ago
- Custom LoadLibrary / GetProcAddress (x86 / x64) - Load DLL and retrieve functions manually☆94Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆378Updated 3 years ago
- COFF and Portable Executable format described using standard C++ with no dependencies.☆338Updated 8 months ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆149Updated 6 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆313Updated 7 years ago
- Kernel LdrLoadDll injector☆265Updated 7 years ago
- Inline syscalls made easy for windows on clang☆729Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆258Updated 3 years ago
- Advanced driver monitoring utility.☆217Updated 3 years ago
- DSE bypass using a leaked cert and adjusting the current clock.☆152Updated 3 months ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆277Updated 3 years ago
- XNTSV program for detailed viewing of system structures for Windows.☆468Updated this week