A tool that reads a PE file from a byte array buffer and injects it into memory.
☆28Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for MemoryPEInjector
Users that are interested in MemoryPEInjector are comparing it to the libraries listed below
Sorting:
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Jun 4, 2019Updated 6 years ago
- ☆37May 9, 2019Updated 6 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts☆25Aug 17, 2018Updated 7 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- PInvoke at runtime for .NET☆17Sep 13, 2018Updated 7 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Mar 18, 2023Updated 2 years ago
- Single header library to simplify the usage of direct syscalls. x64/x86☆14Feb 26, 2023Updated 3 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆17May 22, 2019Updated 6 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
- ☆15Feb 21, 2014Updated 12 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 9 years ago
- Portable Executable launcher for Windows NT bypassing loader☆74Sep 4, 2025Updated 5 months ago
- ☆17Feb 29, 2020Updated 5 years ago