☆28Feb 16, 2022Updated 4 years ago
Alternatives and similar repositories for Process_Injection
Users that are interested in Process_Injection are comparing it to the libraries listed below
Sorting:
- ☆15Aug 17, 2023Updated 2 years ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆18May 6, 2023Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- https://jimshaver.net/2018/02/22/net-over-net-breaking-the-boundaries-of-the-net-framework/☆19Feb 23, 2018Updated 8 years ago
- My experience using Windows API for offensive purposes☆17Jul 10, 2021Updated 4 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆18Jan 3, 2022Updated 4 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- Script to decrypt / import chromium (edge/chrome) cookies☆15Aug 1, 2023Updated 2 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Sep 5, 2021Updated 4 years ago
- Simple .NET loader for loading and executing Powershell payloads☆17Nov 5, 2021Updated 4 years ago
- ☆17Dec 3, 2020Updated 5 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Sep 5, 2024Updated last year
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- ☆28Sep 1, 2023Updated 2 years ago
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆166Aug 2, 2023Updated 2 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- ☆64Dec 29, 2025Updated 2 months ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆100Oct 12, 2021Updated 4 years ago
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated last year
- ☆51Sep 18, 2020Updated 5 years ago
- D/Invoke implementation in Nim☆101Jun 8, 2022Updated 3 years ago
- ☆29May 10, 2024Updated last year
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆434Dec 21, 2023Updated 2 years ago
- ☆26May 22, 2021Updated 4 years ago
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆54Feb 29, 2016Updated 10 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago