Python script to inject and run shellcodes through TLS callbacks
☆49Jun 22, 2015Updated 10 years ago
Alternatives and similar repositories for tlsInjector
Users that are interested in tlsInjector are comparing it to the libraries listed below
Sorting:
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- Ring3 Rootkit Backdoor.☆43Jul 20, 2015Updated 10 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆14Feb 23, 2018Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- A tool similar to netcat, but tunneled over DNS☆18Mar 10, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 8 months ago
- ☆14Jun 30, 2015Updated 10 years ago
- Detect the SCI in windows.☆11Mar 23, 2017Updated 8 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- ☆13Jun 20, 2013Updated 12 years ago
- Simpe C tool to analyze x86 binary for used instructions set☆14Dec 31, 2018Updated 7 years ago
- Native module dumper☆13Aug 28, 2017Updated 8 years ago
- Hidden module/dll detector for windows apps☆15May 21, 2017Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- ☆21Jul 18, 2017Updated 8 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- DLL Injection commandline utility☆26Mar 14, 2013Updated 12 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- 使用python加密so,C动态解密调用☆17Apr 27, 2017Updated 8 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- windows net program☆13Oct 16, 2014Updated 11 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago