0xyg3n / PEx64-InjectorLinks
A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.
☆206Updated last year
Alternatives and similar repositories for PEx64-Injector
Users that are interested in PEx64-Injector are comparing it to the libraries listed below
Sorting:
- The program is designed to obfuscate the shellcode.☆203Updated 4 years ago
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆239Updated 2 years ago
- Escalate as Administrator bypassing the UAC affecting administrator accounts only.☆254Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 6 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆211Updated 4 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated 2 years ago
- Hide malware behind a legit process C#☆128Updated 5 years ago
- Process Ghosting in C#☆219Updated 3 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- dem sharp donuts☆201Updated 3 years ago
- C# Based Universal API Unhooker☆411Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆445Updated 2 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆262Updated 4 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆225Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆278Updated 4 years ago
- Simple PoC demonstrating syscall execution in C#☆155Updated 5 years ago
- Tool to create hidden registry keys.☆492Updated 6 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆201Updated 9 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆592Updated 4 years ago
- ☆154Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆200Updated 4 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Updated 5 years ago
- Evading Anti-Virus with Unusual Technique☆216Updated 2 years ago
- Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components☆272Updated 4 years ago
- C# tool for UAC bypasses☆446Updated 4 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆217Updated 3 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆318Updated 8 years ago
- Simple executable generator with encrypted shellcode.☆280Updated 3 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆108Updated 2 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Updated 4 years ago