Bypass for CS:GO's LoadLibrary injection prevention mechanism, achieved by patching one byte of game memory.
-
Updated
Sep 9, 2020 - Python
Bypass for CS:GO's LoadLibrary injection prevention mechanism, achieved by patching one byte of game memory.
DLL Injector (LoadLibrary) in C++ (x86 / x64) - LoadLibrary DLL injector
Reverse engineering winapi function loadlibrary.
A Dynamic-Link Library which exports the same methods as version.dll (winver.h) and winhttp.dll in addition to chainloading additional user defined libraries.
Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument injection, file overwrites, LD_PRELOAD, etc.).
Load dynamic libraries (DLL/so/dylib) with ease, without cgo.
Header-only library that can execute functions in a shared library and provides wrappers around these
A program that turn anyfile into C++ Source File (char linear table)
An open-source C++ library implementing a loader for multiple executable formats
PE32+ / 64-bit / LoadLibrary without imports table.
C++ project sample for creating and loading DLL with commandline
Simiple DLL injector using LoadLibrary and the Windows API
DLL Injector developed in C++ with an variety of injection methods.
Simple header only dll injector that uses LoadLibraryW.
Windows multiple DLL process injector
Everything you need to play with LoadLibrary injection
WinAPI and Manual Mapper Console Injector in C++
Add a description, image, and links to the loadlibrary topic page so that developers can more easily learn about it.
To associate your repository with the loadlibrary topic, visit your repo's landing page and select "manage topics."