Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
-
Updated
Oct 8, 2024 - C++
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
DLL manual mapping through hooking IAT functions.
DLL Injector developed in C++ with an variety of injection methods.
Add a description, image, and links to the manualmapping topic page so that developers can more easily learn about it.
To associate your repository with the manualmapping topic, visit your repo's landing page and select "manage topics."