0xballistics / inject2peLinks
inject or convert shellcode to PE
☆41Updated 6 years ago
Alternatives and similar repositories for inject2pe
Users that are interested in inject2pe are comparing it to the libraries listed below
Sorting:
- ☆52Updated 5 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- StenographyShellcodeLoader☆43Updated 5 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Updated 6 years ago
- Kernel file/process/object tool☆69Updated 4 years ago
- Shellcode injection POC using syscalls.☆117Updated 5 years ago
- Hijack Printconfig.dll to execute shellcode☆99Updated 4 years ago
- ☆47Updated 6 months ago
- HookDetection☆46Updated 4 years ago
- ☆50Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆61Updated 4 years ago
- RDI implementation in Nim☆64Updated 4 years ago
- ☆74Updated 4 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆106Updated 4 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆26Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Updated 3 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆55Updated 4 years ago
- EDR Evasion - Combination of SwampThing - TikiTorch☆27Updated 5 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 5 years ago
- ☆81Updated 3 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Updated 2 years ago
- ☆74Updated 4 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 3 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 6 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆64Updated 2 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆56Updated 2 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 6 years ago