zodiacon / DllInjectionWithThreadContextLinks
This is a sample that shows how to leverage SetThreadContext for DLL injection
☆85Updated 8 years ago
Alternatives and similar repositories for DllInjectionWithThreadContext
Users that are interested in DllInjectionWithThreadContext are comparing it to the libraries listed below
Sorting:
- Analyze and attack windows applications using dll hijacking vulnerabilities☆59Updated 6 years ago
- An Attempt to Bypass Memory Scanners By Misusing the ntdll.dll "RT" Section.☆100Updated 10 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Updated 7 years ago
- Anti-Anti-VM solution via Windows Driver☆62Updated 7 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Updated 7 years ago
- win10 pgContext dynamic dump (btc version)☆110Updated 6 years ago
- ☆48Updated 8 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆80Updated 6 years ago
- PE(compressed dll) memory loader using nt api☆46Updated 8 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 7 years ago
- ☆26Updated 8 years ago
- 内核级ARK工具。☆62Updated 9 years ago
- C++☆87Updated 9 years ago
- ☆36Updated 8 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Updated 6 years ago
- Polymorphic Stub Creator☆34Updated 8 years ago
- ☆55Updated 9 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Updated 12 years ago
- A minifilter driver preserves all modified and deleted files.☆80Updated 10 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆108Updated 6 years ago
- An ark tool's driver☆40Updated 8 years ago
- windows kernelmode and usermode IAT hook☆149Updated 4 years ago
- Automatically exported from code.google.com/p/wskudp☆43Updated 10 years ago
- PoC for detecting and dumping process hollowing code injection☆52Updated 7 years ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆84Updated last year
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Updated 6 years ago
- ☆27Updated 6 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Updated 15 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Updated 4 years ago
- ☆25Updated 6 years ago