Binject / binjectionLinks
Injects additional machine instructions into various binary formats.
☆287Updated last year
Alternatives and similar repositories for binjection
Users that are interested in binjection are comparing it to the libraries listed below
Sorting:
- Fork of pkg/debug that adds some additional functionality.☆127Updated last year
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Updated 4 years ago
- Elf binary infector written in Go.☆211Updated 8 months ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- A Simple Linux ELF Runtime Crypter☆265Updated 7 months ago
- Small tool to run ELF binaries from memory with a given process name☆169Updated 3 years ago
- bdvl☆114Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Updated 5 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆196Updated last year
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆234Updated 9 months ago
- Golang PE injection on windows☆168Updated 4 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆520Updated 2 years ago
- Search for code cave in all binaries☆285Updated last year
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆347Updated 3 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆331Updated 5 years ago
- Universal Shared Library User-space Loader☆230Updated 3 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Extract Windows Defender database from vdm files and unpack it☆462Updated last month
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆233Updated 5 years ago
- Kernel Exploits☆260Updated 4 years ago
- Linux based inter-process code injection without ptrace(2)☆253Updated 8 years ago
- Demos of various (also non standard) persistence methods used by malware☆223Updated 2 years ago
- ☆494Updated 8 years ago
- Shellcode library as a Go package☆70Updated 5 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆397Updated 5 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆100Updated 2 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆237Updated 5 years ago
- ☆136Updated 6 months ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆433Updated last year
- PoC for proxying COM objects when hijacking☆211Updated 6 years ago