Executing EXE Files From Memory
☆11Nov 1, 2023Updated 2 years ago
Alternatives and similar repositories for PEFromMemory
Users that are interested in PEFromMemory are comparing it to the libraries listed below
Sorting:
- ☆30Aug 24, 2025Updated 6 months ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆16Mar 23, 2020Updated 5 years ago
- Securely Retrieving Hardware Serials Without WMIC From Usermode☆19Nov 3, 2023Updated 2 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- x64dbg scripts for finding OEP of packers☆15Oct 22, 2018Updated 7 years ago
- MiTM proxy server for the RotMG private server Valor. Features predictive autonexus + autoupdater☆18Jul 1, 2022Updated 3 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Mar 4, 2024Updated last year
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Small class to help perform syscalls.☆21May 15, 2025Updated 9 months ago
- Learning Various Process Injection Techniques☆17Apr 4, 2019Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Multi-Layer Automata-Based Encryption strings☆25Jul 9, 2024Updated last year
- ☆49Feb 21, 2022Updated 4 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- ☆58Dec 20, 2023Updated 2 years ago
- Bypass anti-virus with various method☆34Sep 23, 2023Updated 2 years ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- silence file system monitoring components by hooking their minifilters☆60Jan 31, 2024Updated 2 years ago
- A simple present scene, kernel allocation injector.☆27Jun 12, 2022Updated 3 years ago
- A DLL that performs IAT hooking☆27Jul 6, 2018Updated 7 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- Command Line/Terminal tool to parse the SMBIOS Table☆22Jan 29, 2026Updated last month
- ☆10Sep 11, 2021Updated 4 years ago
- A library with four different methods to execute shellcode in a process☆26Mar 24, 2020Updated 5 years ago
- CVE-2023-21707 EXP☆28Jul 6, 2023Updated 2 years ago
- Temporary storage for exe2aut☆32Apr 17, 2019Updated 6 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Apr 19, 2023Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Apr 9, 2023Updated 2 years ago
- NSFW BetterDiscord Themes, made by editing the Not Another Anime Theme with some pictures. This does also include some SFW themes.☆14Jun 24, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆36Jan 15, 2022Updated 4 years ago
- keketest1☆35Apr 16, 2019Updated 6 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- ☆10Sep 3, 2021Updated 4 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- State of the art DLL injector that took 20 minutes to make☆226Aug 16, 2023Updated 2 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago