Cybellum / DoubleAgentLinks
Zero-Day Code Injection and Persistence Technique
☆1,247Updated 3 years ago
Alternatives and similar repositories for DoubleAgent
Users that are interested in DoubleAgent are comparing it to the libraries listed below
Sorting:
- Brand New Code Injection for Windows☆740Updated 5 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Updated 6 years ago
- Demos of various injection techniques found in malware☆795Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,379Updated 3 years ago
- peinjector - MITM PE file infector☆608Updated 9 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆967Updated 4 years ago
- Shellcode Compiler☆1,138Updated last year
- ☆517Updated 7 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆501Updated 8 years ago
- AntiVirus Evasion Tool☆1,730Updated 7 months ago
- EternalRocks worm☆464Updated 8 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Updated last year
- dll injection tool that implements various methods☆499Updated 12 years ago
- NSA finest tool☆986Updated 8 years ago
- Post-exploitation tool for hiding processes from monitoring applications☆743Updated 2 years ago
- metame is a metamorphic code engine for arbitrary executables☆596Updated 6 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆805Updated last year
- UAC bypass, Elevate, Persistence methods☆2,723Updated 2 years ago
- powerful auto-backdooring utility☆751Updated 7 years ago
- Lilith - Foundational reverse engineering resource for cybersecurity entrepreneurs in C++☆740Updated 5 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆380Updated 8 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,420Updated 2 years ago
- A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissio…☆310Updated 7 years ago
- A memory scanning evasion technique☆892Updated 8 years ago
- 💉 DLL/Shellcode injection techniques☆713Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆903Updated 4 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆567Updated 8 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆512Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆730Updated 8 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆460Updated 7 years ago