Skip to content

Process injection in C++ using direct syscalls instead of documented Windows API. Using NtOpenProcess + NtAllocateVirtualMemoryEx + NtWriteVirtualMemory + NtCreateThreadEx.

Notifications You must be signed in to change notification settings

misiungs/Process-Injection-Direct-Syscall-v2-Cpp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Process-Injection-Direct-Syscall-v2-Cpp

Process injection in C++ using direct syscalls instead of documented Windows API. Using NtOpenProcess + NtAllocateVirtualMemoryEx + NtWriteVirtualMemory + NtCreateThreadEx.

About

Process injection in C++ using direct syscalls instead of documented Windows API. Using NtOpenProcess + NtAllocateVirtualMemoryEx + NtWriteVirtualMemory + NtCreateThreadEx.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published