0xyg3n / PEx64-Injector
A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.
☆202Updated 6 months ago
Alternatives and similar repositories for PEx64-Injector
Users that are interested in PEx64-Injector are comparing it to the libraries listed below
Sorting:
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆236Updated last year
- C# Based Universal API Unhooker☆401Updated 3 years ago
- The program is designed to obfuscate the shellcode.☆202Updated 3 years ago
- Windows Defender ShellCode Execution Bypass☆128Updated 5 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆213Updated 3 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated last year
- Tool to create hidden registry keys.☆480Updated 5 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆580Updated 3 years ago
- Process Ghosting in C#☆214Updated 3 years ago
- Escalate as Administrator bypassing the UAC affecting administrator accounts only.☆252Updated 4 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆258Updated 3 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆220Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆431Updated 2 years ago
- .NET project for installing Persistence☆475Updated 10 months ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆456Updated 3 years ago
- C# tool for UAC bypasses☆430Updated 3 years ago
- dem sharp donuts☆196Updated 2 years ago
- Eternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010☆193Updated 3 years ago
- Inject .NET assemblies into an existing process☆494Updated 3 years ago
- Simple PoC demonstrating syscall execution in C#☆154Updated 5 years ago
- Hide malware behind a legit process C#☆120Updated 5 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆332Updated 3 years ago
- ☆149Updated 3 years ago
- A .NET malware loader, using API-Hashing to evade static analysis☆207Updated last year
- Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components☆266Updated 3 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆345Updated 4 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆215Updated 2 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆313Updated 7 years ago
- A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this proje…☆458Updated 3 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆225Updated last year