JonDoNym / peinjectorLinks
peinjector - MITM PE file infector
☆610Updated 9 years ago
Alternatives and similar repositories for peinjector
Users that are interested in peinjector are comparing it to the libraries listed below
Sorting:
- Brand New Code Injection for Windows☆741Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,384Updated 3 years ago
- Demos of various injection techniques found in malware☆797Updated 3 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,010Updated 4 years ago
- Zero-Day Code Injection and Persistence Technique☆1,248Updated 3 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆808Updated last year
- Kernel rootkit, that lives inside the Windows registry values data☆505Updated 8 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- ☆519Updated 7 years ago
- HORSEPILL rootkit PoC☆233Updated 9 years ago
- A shellcode writing toolkit☆684Updated 7 months ago
- metame is a metamorphic code engine for arbitrary executables☆599Updated 6 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆469Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 8 years ago
- C++ application that uses memory and code hooks to detect packers☆274Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Updated 3 years ago
- Automated Linux evil maid attack☆435Updated 10 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Updated 5 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆463Updated 7 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆570Updated 8 years ago
- A fast and stealthy credential harvester☆627Updated 2 years ago
- proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI☆407Updated 6 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆408Updated 11 years ago
- BEURK Experimental Unix RootKit☆388Updated 8 years ago
- Various snippets created during malware analysis☆465Updated 4 months ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Updated 8 years ago
- A tool to detect and crash Cuckoo Sandbox☆297Updated last year
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Updated 9 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆672Updated 8 years ago
- LLDB MCP Integration + other helpful commands☆740Updated 10 months ago