0xballistics / inject2peLinks
inject or convert shellcode to PE
☆39Updated 5 years ago
Alternatives and similar repositories for inject2pe
Users that are interested in inject2pe are comparing it to the libraries listed below
Sorting:
- Kernel file/process/object tool☆67Updated 3 years ago
- ☆50Updated 4 years ago
- ☆51Updated 5 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- Hijack Printconfig.dll to execute shellcode☆98Updated 4 years ago
- ☆35Updated 4 years ago
- x64 version☆34Updated 3 years ago
- ☆38Updated 4 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 5 years ago
- HookDetection☆46Updated 3 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- Simple windows rpc server for research purposes only☆82Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- ☆74Updated 3 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- Loads shellcode from a resource file.☆22Updated 5 years ago
- Injects shellcode into remote processes using direct syscalls☆78Updated 4 years ago
- Security Support Provider Interface☆46Updated 5 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 4 years ago
- ☆44Updated last month
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- ☆37Updated 4 years ago