EgeBalci / MapPELinks
PE file mapping and manipulation package.
☆36Updated 3 years ago
Alternatives and similar repositories for MapPE
Users that are interested in MapPE are comparing it to the libraries listed below
Sorting:
- Assembly block for hooking windows API functions.☆93Updated 6 years ago
- Basic multi platform meterpreter loader module.☆15Updated 5 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆77Updated 2 years ago
- A better alternative to RunDLL32☆33Updated 6 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 4 years ago
- Some simple process injection techniques targeting the Windows platform☆31Updated 5 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆30Updated 3 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- An example of PE hollowing injection technique☆24Updated 6 years ago
- ☆36Updated 6 years ago
- ☆92Updated 4 years ago
- Windows (ShadowMove) Socket Duplication☆86Updated 5 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆106Updated 4 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆106Updated 5 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆98Updated 5 years ago
- Shellcode to load an appended Dll☆89Updated 4 years ago
- exploit termdd.sys(support kb4499175)☆60Updated 6 years ago
- Chrome cookie dumper☆17Updated 4 years ago
- Hijack Printconfig.dll to execute shellcode☆99Updated 4 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆28Updated 6 years ago
- ☆50Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated 3 months ago
- Several self-defense shellcodes☆23Updated 6 years ago
- ☆64Updated 2 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆42Updated 4 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 8 years ago