0xyg3n / PEx64-InjectorLinks
A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.
☆205Updated 8 months ago
Alternatives and similar repositories for PEx64-Injector
Users that are interested in PEx64-Injector are comparing it to the libraries listed below
Sorting:
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆238Updated 2 years ago
- The program is designed to obfuscate the shellcode.☆205Updated 4 years ago
- Escalate as Administrator bypassing the UAC affecting administrator accounts only.☆255Updated 4 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated 2 years ago
- Windows Defender ShellCode Execution Bypass☆130Updated 5 years ago
- C# Based Universal API Unhooker☆405Updated 3 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆213Updated 3 years ago
- Hide malware behind a legit process C#☆121Updated 5 years ago
- ☆153Updated 3 years ago
- Process Ghosting in C#☆216Updated 3 years ago
- Simple PoC demonstrating syscall execution in C#☆154Updated 5 years ago
- dem sharp donuts☆199Updated 2 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆260Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆436Updated 2 years ago
- Mosaique - Remote administration tools☆75Updated 4 years ago
- C# tool for UAC bypasses☆439Updated 3 years ago
- Tool to create hidden registry keys.☆486Updated 5 years ago
- Chromium Cookie import / export tool☆304Updated 2 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆221Updated 4 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆315Updated 7 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆583Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆274Updated 3 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆197Updated 8 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components☆268Updated 3 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆203Updated 3 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆217Updated 2 years ago
- Evading Anti-Virus with Unusual Technique☆215Updated 2 years ago
- A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this proje…☆460Updated 3 years ago
- Inject .NET assemblies into an existing process☆498Updated 3 years ago