☆28Feb 16, 2022Updated 4 years ago
Alternatives and similar repositories for Process_Injection
Users that are interested in Process_Injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Machine learning enabled dropper☆28May 1, 2023Updated 3 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- ☆17Dec 3, 2020Updated 5 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- ☆78Jan 1, 2026Updated 4 months ago
- D/Invoke implementation in Nim☆101Jun 8, 2022Updated 3 years ago
- My Personal Kernel-Mode Process dumper☆14Feb 18, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆64Dec 29, 2025Updated 4 months ago
- ☆12Sep 9, 2023Updated 2 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Just another .data pointer hook. This time it's hooking AfdIrpCallDispatch within Afd.sys☆12Feb 22, 2022Updated 4 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 10 years ago
- Obfuscate Python code, stage payloads, and evade defenses☆25Apr 19, 2026Updated last month
- ☆18May 6, 2023Updated 3 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆167Aug 2, 2023Updated 2 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆102Sep 5, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- ☆10Nov 27, 2017Updated 8 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- ☆75Jun 17, 2025Updated 11 months ago
- My experience using Windows API for offensive purposes☆17Jul 10, 2021Updated 4 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Mar 16, 2023Updated 3 years ago
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing…☆32Feb 26, 2020Updated 6 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- ☆41Jun 23, 2024Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆103Oct 12, 2021Updated 4 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆25Sep 5, 2021Updated 4 years ago