JonDoNym / peinjector
peinjector - MITM PE file infector
☆598Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for peinjector
- NetRipper - Smart traffic sniffing for penetration testers☆1,352Updated 2 years ago
- Brand New Code Injection for Windows☆723Updated 4 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆991Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆820Updated 7 years ago
- C++ application that uses memory and code hooks to detect packers☆268Updated 6 years ago
- Demos of various injection techniques found in malware☆792Updated 2 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆942Updated 3 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆486Updated 7 years ago
- HORSEPILL rootkit PoC☆222Updated 8 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆772Updated 8 months ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆227Updated 8 years ago
- A tool to help you write binary exploits☆604Updated 5 years ago
- A shellcode writing toolkit☆659Updated 2 years ago
- ☆518Updated 6 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆737Updated 5 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆359Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆314Updated 2 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆850Updated 7 years ago
- ZeroAccess v3 toolkit☆161Updated 6 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆759Updated 4 years ago
- Various snippets created during malware analysis☆457Updated last year
- Python Decoders for Common Remote Access Trojans☆1,068Updated 3 months ago
- metame is a metamorphic code engine for arbitrary executables☆569Updated 5 years ago
- Exploit the credentials present in files and memory☆837Updated last year
- Zero-Day Code Injection and Persistence Technique☆1,217Updated 2 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- Automated Linux evil maid attack☆419Updated 8 years ago