Process Injection: CreateRemoteThread
☆26Dec 17, 2020Updated 5 years ago
Alternatives and similar repositories for remote-thread-injection
Users that are interested in remote-thread-injection are comparing it to the libraries listed below
Sorting:
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Process Injection: APC Injection☆32Jan 13, 2021Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- string encryption in Nim☆20Jun 15, 2024Updated last year
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last week
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 10 months ago
- Python scripts for reviewing Palo Alto Firewall configurations☆35Jul 1, 2025Updated 8 months ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆41Jul 22, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆291Mar 8, 2023Updated 2 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- Encrypt C functions☆41Jun 17, 2023Updated 2 years ago
- ☆84Aug 26, 2024Updated last year
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- Deflate64 - Decripting Base 64 strings, decompress content (sploits Power Shell)☆10Oct 30, 2017Updated 8 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆49Nov 10, 2024Updated last year
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆121Sep 14, 2021Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆100Jun 18, 2020Updated 5 years ago
- Penetration Testing Interview Questions☆53Apr 15, 2022Updated 3 years ago
- Simple PoC demonstrating syscall execution in C#☆156Apr 30, 2020Updated 5 years ago
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago