Proof-of-Concept code snippets for a variety of different process injection techniques
☆23Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for ProcessInjectionPOCs
Users that are interested in ProcessInjectionPOCs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- The code I write in my blog☆94Feb 21, 2026Updated last month
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 9 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆14Jul 26, 2025Updated 8 months ago
- Command line & PPID spoofing☆30Apr 15, 2023Updated 3 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 11 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- .NET Obfuscator designed to protect applications from reverse-engineering through advanced code obfuscation techniques.☆16Dec 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode