This is a malware that i used in it remote process injection technique, it scans for processes chooses the one you named and inject shellcode in it
☆18Sep 12, 2024Updated last year
Alternatives and similar repositories for Remote_Process_Injection
Users that are interested in Remote_Process_Injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Sep 21, 2024Updated last year
- This Malware is an application for MalwareEvasionTechniques repo .I used in it Registery staging in two modes R/W and I combined it with …☆16Sep 14, 2024Updated last year
- A powerful PE file inspector for analyzing Portable Executable binaries, providing detailed insights into their structure, headers, and p…☆19Dec 30, 2024Updated last year
- nexos source files made by @samdem-ai☆14Oct 7, 2024Updated last year
- ☆14Sep 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A custom implementation of GetModuleHandle, often used in malware to evade detection by bypassing standard API resolution methods☆18Dec 31, 2024Updated last year
- Function Stomping (MITRE ATT&CK ID: T1055.012) — Advanced injection technique overwriting legitimate functions with custom payloads to ev…☆19Dec 24, 2024Updated last year
- A repository showcasing payload execution control using mutexes, semaphores, and events in Windows, for educational purposes.☆17Dec 18, 2024Updated last year
- Research in progress: A malware that abuses the GPU to accelerate the decryption process.☆21Feb 26, 2025Updated last year
- This is a repo that contains 2 techniques : Local mapping injection and Remote injection technique , MITRE ID T1055☆17Oct 12, 2024Updated last year
- Research project showcasing various malware evasion techniques used to bypass AVs and EDRs, continuously updated with new methods.☆39Jan 8, 2025Updated last year
- A Windows string hashing toolkit for security research and malware analysis.Research implementation of malware-focused algorithms from V…☆15Dec 29, 2024Updated last year
- Malware evasion technique by manipulating process command-line arguments to hide the actual executed payload, used to evade the manual de…☆16Dec 23, 2024Updated last year
- Code injection via Asynchronous Procedure Calls to bypass Windows defenses. Mapped to MITRE ATT&CK T1055.004.(Process Injection: Asynchro…