💉 DLL/Shellcode injection techniques
-
Updated
Mar 26, 2019 - C++
💉 DLL/Shellcode injection techniques
Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.
VAC-proof 32bit DLL injector written in C++, using memory mapping and thread hijacking techniques
Win32 PE (dll, sys, exe) remote manual mapper written on PHP with injector-client written on C++20
manual mapping injector
A robust, feature-rich manual map DLL injection library for Windows x64 processes. This implementation provides stealthy DLL injection with automatic cleanup capabilities, SEH support, and memory wiping for anti-detection.
Golang Manual Mapper DLL injector
Advanced DLL Injector for x86/x64 processes entirely written in C# & C++, which can switch to different native functions in realtime, with also Thread Hijacking + Manual Mapping!
Windows dll injector
ServerSideMapper32 - Server-Side DLL Mapping Solution
Standard and DLL Manual Mapping
Simple Dll injector loading from disk. Supports PE header and entry point erasure. Written in C99.
En este trabajo se investigan y desarrollan diversas técnicas para combatir la piratería informática y la ingeniería inversa, con el fin de proteger programas externos previamente compilados de las manos de personas con malas intenciones.
Detect manually mapped modules in Windows processes using runtime memory scanning, entropy analysis, and PE structure inspection for security research.
Add a description, image, and links to the manual-map-dll topic page so that developers can more easily learn about it.
To associate your repository with the manual-map-dll topic, visit your repo's landing page and select "manage topics."