0xlane / com-process-inject
Process Injection via Component Object Model (COM) IRundown::DoCallback().
☆59Updated 2 years ago
Alternatives and similar repositories for com-process-inject:
Users that are interested in com-process-inject are comparing it to the libraries listed below
- ProcessGhosting 技术的 rust 实现版本☆25Updated 5 months ago
- ☆30Updated last year
- Kill Protected Process Light Process (include av)☆56Updated last year
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆121Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆114Updated last year
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated last year
- shellcode-loaders and beacon-loaders☆64Updated last year
- Windows API Call Obfuscation☆100Updated 2 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆55Updated 3 months ago
- Call NtCreateUserProcess directly as normal.☆71Updated 2 years ago
- An implementation of an indirect system call☆126Updated last year
- shellcode生成框架☆85Updated 9 months ago
- https://key08.com/index.php/2021/10/19/1375.html☆66Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆70Updated 3 years ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago
- DLL 转发工具方法。☆52Updated last year
- Windows 常用版本内核文件收集☆10Updated last year
- Windows Defender VDM lua collections☆47Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆105Updated 2 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆63Updated 2 years ago
- An easy-to-use and powerful Macro for Stack Spoofing.☆19Updated 3 months ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆99Updated 2 years ago
- Load static-compiled PE from remote server.☆60Updated 3 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆60Updated 4 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- 大数字驱动逆向代码☆71Updated last year
- about how to make a anti-virus engine☆51Updated 2 weeks ago
- Detect BypassUAC using AMSI☆22Updated 2 months ago
- ☆198Updated 3 years ago