Process Injection: CreateRemoteThread
☆26Dec 17, 2020Updated 5 years ago
Alternatives and similar repositories for remote-thread-injection
Users that are interested in remote-thread-injection are comparing it to the libraries listed below
Sorting:
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Process Injection: APC Injection☆33Jan 13, 2021Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- A cheatsheet and mindmap for CRTO certification☆15Mar 22, 2023Updated 3 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 3 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- ☆14Apr 21, 2017Updated 8 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last week
- string encryption in Nim☆19Jun 15, 2024Updated last year
- ☆15Jan 22, 2017Updated 9 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- 🔐🐘 PostgreSQL WebAuthn Server☆14Sep 30, 2025Updated 5 months ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆290Mar 8, 2023Updated 3 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last month
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- cs1.6辅助源码,控制台程序,无限金钱,hp,无后座力,方框透视等。☆16Feb 22, 2020Updated 6 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆122Sep 14, 2021Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- ☆10Oct 10, 2019Updated 6 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Tool to get NT system shell .☆11Jun 29, 2021Updated 4 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- A tool for converting BIP39 mnemonic phrases to addresses and private keys, creating and signing transactions.☆11Feb 19, 2026Updated last month
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆101Jun 18, 2020Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- A .net lib to generate an native coff executable☆13Apr 30, 2015Updated 10 years ago
- Simple PoC demonstrating syscall execution in C#☆156Apr 30, 2020Updated 5 years ago