JonDoNym / peinjectorLinks
peinjector - MITM PE file infector
☆606Updated 9 years ago
Alternatives and similar repositories for peinjector
Users that are interested in peinjector are comparing it to the libraries listed below
Sorting:
- NetRipper - Smart traffic sniffing for penetration testers☆1,376Updated 3 years ago
- Brand New Code Injection for Windows☆738Updated 4 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,007Updated 4 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆326Updated 3 years ago
- Demos of various injection techniques found in malware☆793Updated 3 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆794Updated last year
- Zero-Day Code Injection and Persistence Technique☆1,240Updated 3 years ago
- metame is a metamorphic code engine for arbitrary executables☆589Updated 5 years ago
- C++ application that uses memory and code hooks to detect packers☆271Updated 7 years ago
- HORSEPILL rootkit PoC☆228Updated 9 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- Kernel rootkit, that lives inside the Windows registry values data☆497Updated 7 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆458Updated 6 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆781Updated 4 years ago
- A shellcode writing toolkit☆676Updated last month
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- A fast and stealthy credential harvester☆628Updated 2 years ago
- ☆517Updated 7 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,317Updated 3 years ago
- Various snippets created during malware analysis☆456Updated 2 years ago
- proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI☆405Updated 6 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆997Updated 6 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆959Updated 4 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- Exploit the credentials present in files and memory☆845Updated 2 years ago
- Malware exploits☆550Updated 5 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆243Updated 9 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆380Updated 8 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆863Updated 8 years ago