0xlane / com-process-injectLinks
Process Injection via Component Object Model (COM) IRundown::DoCallback().
☆59Updated 2 years ago
Alternatives and similar repositories for com-process-inject
Users that are interested in com-process-inject are comparing it to the libraries listed below
Sorting:
- ProcessGhosting 技术的 rust 实现版本☆25Updated 7 months ago
- Kill Protected Process Light Process (include av)☆56Updated last year
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆71Updated 3 years ago
- An implementation of an indirect system call☆127Updated last year
- Call NtCreateUserProcess directly as normal.☆71Updated 3 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆67Updated 3 years ago
- shellcode-loaders and beacon-loaders☆64Updated last year
- Windows API Call Obfuscation☆104Updated 2 years ago
- ☆30Updated last year
- shellcode生成框架☆86Updated 10 months ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆55Updated 3 weeks ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆118Updated 2 years ago
- Windows 常用版本内核文件收集☆10Updated last year
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆122Updated last year
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆106Updated 3 years ago
- ☆200Updated 3 years ago
- DLL 转发工具方法。☆52Updated last year
- An Obfuscator-LLVM based mingw-w64 toolchain.☆39Updated 3 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆103Updated 2 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆106Updated 4 years ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated last year
- Finding Truth in the Shadows☆92Updated 2 years ago
- 大数字驱动逆向代码☆71Updated last year
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆137Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆63Updated 9 months ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆32Updated 2 years ago
- Load static-compiled PE from remote server.☆62Updated 3 years ago