Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types like zip, rar, docx, jpg, and more, allowing for customizable payloads. It ensures seamless payload injection while maintaining the integrity of the original file.
☆147Jan 12, 2025Updated last year
Alternatives and similar repositories for Injectra
Users that are interested in Injectra are comparing it to the libraries listed below
Sorting:
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆17Oct 17, 2024Updated last year
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Updated this week
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Nov 13, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆15Jan 29, 2025Updated last year
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Oct 17, 2024Updated last year
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆35Feb 4, 2026Updated 3 weeks ago
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆37Dec 3, 2024Updated last year
- ☆53Sep 23, 2025Updated 5 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆82Apr 12, 2025Updated 10 months ago
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆17Oct 19, 2024Updated last year
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Apr 22, 2024Updated last year
- ☆12Feb 4, 2025Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Jan 18, 2025Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Oct 17, 2024Updated last year
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆259Mar 13, 2024Updated last year
- ☆39May 4, 2025Updated 9 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated last month
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- DataWhiz is a Python-based OSINT tool for retrieving Pakistani mobile and CNIC data. Built with both CLI and GUI interfaces, it was devel…☆19Nov 24, 2025Updated 3 months ago
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 7 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Jan 29, 2015Updated 11 years ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- Event Tracing for Windows EDR bypass in Rust (usermode)☆39Jun 9, 2024Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Mar 26, 2025Updated 11 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆162Jun 19, 2025Updated 8 months ago
- Adversary Emulation Framework☆130Jul 1, 2025Updated 8 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago