Process Injection: CreateRemoteThread
☆26Dec 17, 2020Updated 5 years ago
Alternatives and similar repositories for remote-thread-injection
Users that are interested in remote-thread-injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- A cheatsheet and mindmap for CRTO certification☆16Mar 22, 2023Updated 3 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 4 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- ☆14Apr 21, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- ☆16Apr 14, 2020Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Run shell commands in SQL prompt☆10Jul 11, 2024Updated last year
- 🔐🐘 PostgreSQL WebAuthn Server☆14Sep 30, 2025Updated 7 months ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆290Mar 8, 2023Updated 3 years ago
- Educational collection of LLVM obfuscation passes. (Feel free to use it for your course)☆34Apr 22, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆122Sep 14, 2021Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- ☆10Oct 10, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- A tool for converting BIP39 mnemonic phrases to addresses and private keys, creating and signing transactions.☆11Feb 19, 2026Updated 2 months ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆101Jun 18, 2020Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- A Neovim Jira plugin☆11Apr 20, 2023Updated 3 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- A .net lib to generate an native coff executable☆13Apr 30, 2015Updated 11 years ago
- Simple PoC demonstrating syscall execution in C#☆156Apr 30, 2020Updated 6 years ago
- ECDSA for PostgreSQL☆15Mar 22, 2023Updated 3 years ago
- Top disclosed reports from HackerOne☆10Jun 9, 2020Updated 5 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago