JonDoNym / peinjectorLinks
peinjector - MITM PE file infector
☆606Updated 9 years ago
Alternatives and similar repositories for peinjector
Users that are interested in peinjector are comparing it to the libraries listed below
Sorting:
- NetRipper - Smart traffic sniffing for penetration testers☆1,378Updated 3 years ago
- Brand New Code Injection for Windows☆739Updated 4 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,005Updated 4 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆803Updated last year
- Malware exploits☆549Updated last month
- Demos of various injection techniques found in malware☆795Updated 3 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Updated 3 years ago
- A shellcode writing toolkit☆681Updated 3 months ago
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- A fully featured backdoor that uses Twitter as a C&C server☆784Updated 5 years ago
- ☆517Updated 7 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆498Updated 7 years ago
- powerful auto-backdooring utility☆752Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- Various snippets created during malware analysis☆458Updated last month
- Zero-Day Code Injection and Persistence Technique☆1,244Updated 3 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆996Updated 6 years ago
- C++ application that uses memory and code hooks to detect packers☆271Updated 7 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆565Updated 8 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆663Updated 7 years ago
- BEURK Experimental Unix RootKit☆384Updated 8 years ago
- Automated Linux evil maid attack☆431Updated 9 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆458Updated 6 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Exploit the credentials present in files and memory☆845Updated 2 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆346Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325Updated 9 years ago