0xlane / ppspoofingLinks
Rust编写的父进程PID欺骗技术测试工具
☆53Updated 3 years ago
Alternatives and similar repositories for ppspoofing
Users that are interested in ppspoofing are comparing it to the libraries listed below
Sorting:
- DLL 转发工具方法。☆54Updated 2 years ago
- HVNC based on RustDesk☆108Updated last year
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated 2 years ago
- ☆17Updated 8 months ago
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29Updated 4 years ago
- RawCopy - Golang implementation☆24Updated 3 years ago
- UAC_wenpon☆49Updated 4 years ago
- A SigFlip implement in golang☆51Updated 4 years ago
- Code with Windows Hacker☆12Updated 3 years ago
- Golang implementation of Reflective load PE from memory☆64Updated 3 years ago
- load assembly executable file in memory☆41Updated 2 years ago
- 自用的shellcode生成框架☆32Updated 2 years ago
- ☆14Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆67Updated 3 years ago
- DLL Unhooking☆13Updated 4 years ago
- use aswArPot.sys to kill process☆69Updated 3 years ago
- works but not work, cao!☆24Updated 4 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- CS http Dynamic Encrypt Bridge.☆47Updated 4 years ago
- PPID Spoofing☆19Updated 5 years ago
- desktop screenshot☆29Updated 2 years ago
- ☆13Updated 5 years ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Updated last year
- shadow tls client☆14Updated 3 years ago
- ☆74Updated 4 years ago
- BOF内存运行exe☆30Updated 2 years ago
- use shellcode as asm function☆23Updated 3 years ago