0xyg3n / PEx64-Injector
A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.
☆202Updated 6 months ago
Alternatives and similar repositories for PEx64-Injector:
Users that are interested in PEx64-Injector are comparing it to the libraries listed below
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆235Updated last year
- Hide malware behind a legit process C#☆118Updated 5 years ago
- Windows Defender ShellCode Execution Bypass☆128Updated 5 years ago
- Escalate as Administrator bypassing the UAC affecting administrator accounts only.☆253Updated 4 years ago
- C# Based Universal API Unhooker☆400Updated 3 years ago
- The program is designed to obfuscate the shellcode.☆201Updated 3 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆213Updated 3 years ago
- Process Ghosting in C#☆213Updated 3 years ago
- How to spoof the command line when spawning a new process from C#.☆106Updated 3 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆216Updated 3 years ago
- C# tool for UAC bypasses☆428Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆430Updated 2 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated last year
- Another meterpreter injection technique using C# that attempts to bypass Defender☆258Updated 3 years ago
- dem sharp donuts☆195Updated 2 years ago
- Eternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010☆194Updated 3 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆578Updated 3 years ago
- .NET project for installing Persistence☆475Updated 9 months ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆157Updated 4 years ago
- Tool to create hidden registry keys.☆480Updated 5 years ago
- Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components☆266Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆455Updated 3 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆273Updated 3 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆313Updated 7 years ago
- Evading Anti-Virus with Unusual Technique☆214Updated 2 years ago
- Escalation / Bypass Windows UAC☆109Updated 5 years ago
- Process Ghosting Tool☆172Updated 3 years ago
- Managed assembly shellcode generation