LoadLibraryExW LdrLoadDll drpLoadDll LdrpLoadDllInternal ManualMapping
-
Updated
May 16, 2024 - C++
LoadLibraryExW LdrLoadDll drpLoadDll LdrpLoadDllInternal ManualMapping
Proof of concept for different Windows vulnerabilities
Frame rate limit unlocker of the Kingdom Under Fire: The Crusaders
Return address checking library; used to catch foreign calls into protected code
Injects cheat code into the game process.Injects an external DLL file into the target process.Loads and associates a DLL file into the target process.
Injection of x86 DLLs into x86 processes is fully supported.Developed using C++, because real programmers choose C++ over C#.
AMSI DLL-Wrapper (DLL-Implant)
COMING SOON Standalone POC of the main exploit used in MNSPlusTrasher
Stormwave is a malware written in Golang. The agent talk with a C2 server.
vulnerable app, legit and evil DLLs for sideloading attack PoCs
PowerShell script to find, report, and mitigate (where possible) EXEs with exploitable DLLs
Script that generate VS project with x64 DLL for hijacking
DXGI shim and Mono Runtime integration for Deadlink
A dll hijacking vulnerability in zoom meeting < 5.1.4. CVE-2020-9767
Add a description, image, and links to the dll-hijacking topic page so that developers can more easily learn about it.
To associate your repository with the dll-hijacking topic, visit your repo's landing page and select "manage topics."