0xyg3n / PEx64-InjectorLinks
A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.
☆204Updated last year
Alternatives and similar repositories for PEx64-Injector
Users that are interested in PEx64-Injector are comparing it to the libraries listed below
Sorting:
- The program is designed to obfuscate the shellcode.☆203Updated 4 years ago
- Escalate as Administrator bypassing the UAC affecting administrator accounts only.☆253Updated 4 years ago
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆239Updated 2 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 5 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated 2 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆212Updated 3 years ago
- Hide malware behind a legit process C#☆126Updated 5 years ago
- Process Ghosting in C#☆216Updated 3 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆262Updated 4 years ago
- C# Based Universal API Unhooker☆408Updated 3 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆223Updated 4 years ago
- Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components☆267Updated 4 years ago
- Windows NTLM Authentication Backdoor☆241Updated 9 months ago
- ☆153Updated 4 years ago
- Simple PoC demonstrating syscall execution in C#☆154Updated 5 years ago
- C# tool for UAC bypasses☆445Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- A small shellcode loader library written in C#☆48Updated 3 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Updated 5 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- dem sharp donuts☆201Updated 3 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆200Updated 8 years ago
- Tool to create hidden registry keys.☆489Updated 6 years ago
- Evading Anti-Virus with Unusual Technique☆215Updated 2 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆108Updated 2 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Updated 4 years ago
- C# Reflective loader for unmanaged binaries.☆442Updated 2 years ago
- Mosaique - Remote administration tools☆74Updated 4 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 4 years ago