Reverse engineering winapi function loadlibrary.
-
Updated
Apr 17, 2023 - C++
Reverse engineering winapi function loadlibrary.
DLL Injector (LoadLibrary) in C++ (x86 / x64) - LoadLibrary DLL injector
Bypass for CS:GO's LoadLibrary injection prevention mechanism, achieved by patching one byte of game memory.
A Dynamic-Link Library that exports the same methods as version.dll (winver.h) and winhttp.dll, in addition to chainloading additional user-defined libraries
Load dynamic libraries (DLL/so/dylib) with ease, without cgo.
Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument injection, file overwrites, LD_PRELOAD, etc.).
PoC shellcode injector using clean syscalls to bypass user-mode hooks in ntdll.dll
Header-only library that can execute functions in a shared library and provides wrappers around these
A program that turn anyfile into C++ Source File (char linear table)
An open-source C++ library implementing a loader for multiple executable formats
DLL Injector developed in C++ with an variety of injection methods.
PE32+ / 64-bit / LoadLibrary without imports table.
Simiple DLL injector using LoadLibrary and the Windows API
Windows multiple DLL process injector
Minimal project template for a Windows DLL in C or C++
WinAPI and Manual Mapper Console Injector in C++
Simple header only dll injector that uses LoadLibraryW.
POC of module enumeration through stack walking
Add a description, image, and links to the loadlibrary topic page so that developers can more easily learn about it.
To associate your repository with the loadlibrary topic, visit your repo's landing page and select "manage topics."