0xballistics / inject2pe
inject or convert shellcode to PE
☆38Updated 5 years ago
Alternatives and similar repositories for inject2pe:
Users that are interested in inject2pe are comparing it to the libraries listed below
- ☆50Updated 4 years ago
- Kernel file/process/object tool☆66Updated 3 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- ☆74Updated 3 years ago
- Hijack Printconfig.dll to execute shellcode☆98Updated 4 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- ☆51Updated 5 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆38Updated 2 years ago
- ☆44Updated last week
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 5 years ago
- ☆80Updated 3 years ago
- x64 version☆34Updated 3 years ago
- ☆38Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- HookDetection☆46Updated 3 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- my learning case about windows☆21Updated 3 years ago
- Load PE via XML Attribute☆30Updated 5 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- ☆37Updated 5 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆32Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- ☆35Updated 4 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆53Updated 3 years ago
- ☆46Updated last year
- ☆9Updated last year
- ☆40Updated 3 years ago