Process Injection: CreateRemoteThread
☆26Dec 17, 2020Updated 5 years ago
Alternatives and similar repositories for remote-thread-injection
Users that are interested in remote-thread-injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Process Injection: APC Injection☆33Jan 13, 2021Updated 5 years ago
- A cheatsheet and mindmap for CRTO certification☆16Mar 22, 2023Updated 3 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 4 years ago
- From 32-bit process to 64-bit process☆68Apr 17, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- string encryption in Nim☆19Jun 15, 2024Updated last year
- ☆15Jan 22, 2017Updated 9 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- 🔐🐘 PostgreSQL WebAuthn Server☆14Sep 30, 2025Updated 6 months ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆289Mar 8, 2023Updated 3 years ago
- Educational collection of LLVM obfuscation passes. (Feel free to use it for your course)☆33Nov 16, 2025Updated 4 months ago
- Threat Mitigation Strategies☆29Feb 18, 2026Updated last month
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- CVE-2020-14882批量验证工具。☆12Dec 1, 2020Updated 5 years ago
- cs1.6辅助源码,控制台程序,无限金钱,hp,无后座力,方框透视等。☆17Feb 22, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CS 1.6中文版游戏外挂☆15Feb 22, 2019Updated 7 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆122Sep 14, 2021Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- ☆10Oct 10, 2019Updated 6 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool for converting BIP39 mnemonic phrases to addresses and private keys, creating and signing transactions.☆11Feb 19, 2026Updated last month
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆101Jun 18, 2020Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- A Neovim Jira plugin☆11Apr 20, 2023Updated 2 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago