☆28Feb 16, 2022Updated 4 years ago
Alternatives and similar repositories for Process_Injection
Users that are interested in Process_Injection are comparing it to the libraries listed below
Sorting:
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- ☆17Dec 3, 2020Updated 5 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated last year
- ☆46Jun 21, 2023Updated 2 years ago
- a sandbox project by sudami☆17Jul 31, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- ☆76Jan 1, 2026Updated 2 months ago
- My Personal Kernel-Mode Process dumper☆14Feb 18, 2024Updated 2 years ago
- ☆64Dec 29, 2025Updated 2 months ago
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- ☆12Sep 9, 2023Updated 2 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Obfuscate Python code, stage payloads, and evade defenses☆23Mar 10, 2026Updated last week
- ☆18May 6, 2023Updated 2 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆166Aug 2, 2023Updated 2 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆101Sep 5, 2024Updated last year
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- ☆74Jun 17, 2025Updated 9 months ago
- My experience using Windows API for offensive purposes☆17Jul 10, 2021Updated 4 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Mar 16, 2023Updated 3 years ago
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing…☆32Feb 26, 2020Updated 6 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- ☆42Jun 23, 2024Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆100Oct 12, 2021Updated 4 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆25Sep 5, 2021Updated 4 years ago
- ☆12Aug 10, 2019Updated 6 years ago