A repository where I share my injection implemintations
☆29Jul 26, 2020Updated 5 years ago
Alternatives and similar repositories for Injections
Users that are interested in Injections are comparing it to the libraries listed below
Sorting:
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Sep 13, 2019Updated 6 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- CVE-2021-1675 (PrintNightmare)☆77Jul 5, 2021Updated 4 years ago
- ☆23May 28, 2021Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- C++ function that will automagically unhook a specified Windows API☆62Oct 14, 2020Updated 5 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- A collection of Frida hooks for experimentation on Windows platforms.☆100May 6, 2019Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Dll that can be used for side loading and other attack vector.☆205Sep 17, 2020Updated 5 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Simple HTTP GET/POST example with WinINet in C++☆14Jul 27, 2017Updated 8 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 2 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 3 years ago
- ☆52Oct 17, 2019Updated 6 years ago
- Clone running process with ZwCreateProcess☆59Nov 8, 2020Updated 5 years ago
- Simple PoC demonstrating syscall execution in C#☆156Apr 30, 2020Updated 5 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆347Jul 21, 2020Updated 5 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- ☆16Dec 5, 2023Updated 2 years ago