0xyg3n / PEx64-InjectorLinks
A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.
☆204Updated 11 months ago
Alternatives and similar repositories for PEx64-Injector
Users that are interested in PEx64-Injector are comparing it to the libraries listed below
Sorting:
- The program is designed to obfuscate the shellcode.☆202Updated 4 years ago
- Escalate as Administrator bypassing the UAC affecting administrator accounts only.☆252Updated 4 years ago
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆240Updated 2 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 5 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆113Updated 2 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆211Updated 3 years ago
- Hide malware behind a legit process C#☆125Updated 5 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆223Updated 4 years ago
- Process Ghosting in C#☆215Updated 3 years ago
- ☆153Updated 4 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components☆267Updated 4 years ago
- Stop Windows Defender using the Win32 API☆191Updated 3 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆261Updated 3 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆37Updated 5 years ago
- Windows NTLM Authentication Backdoor☆240Updated 8 months ago
- C# Based Universal API Unhooker☆407Updated 3 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆201Updated 8 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- Evading Anti-Virus with Unusual Technique☆215Updated 2 years ago
- A small shellcode loader library written in C#☆48Updated 3 years ago
- Simple PoC demonstrating syscall execution in C#☆154Updated 5 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆232Updated last year
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆108Updated 2 years ago
- C# Reflective loader for unmanaged binaries.☆442Updated 2 years ago
- C# tool for UAC bypasses☆445Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆247Updated 5 years ago
- Mosaique - Remote administration tools☆74Updated 4 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆587Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆202Updated 4 years ago