JonDoNym / peinjector
peinjector - MITM PE file infector
☆602Updated 8 years ago
Alternatives and similar repositories for peinjector:
Users that are interested in peinjector are comparing it to the libraries listed below
- NetRipper - Smart traffic sniffing for penetration testers☆1,361Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆995Updated 3 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆320Updated 2 years ago
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆490Updated 7 years ago
- A fast and stealthy credential harvester☆622Updated last year
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Brand New Code Injection for Windows☆727Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆952Updated 4 years ago
- A tool to help you write binary exploits☆607Updated 5 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆276Updated 9 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆345Updated 8 years ago
- Malware exploits☆541Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- Zero-Day Code Injection and Persistence Technique☆1,221Updated 2 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 7 months ago
- ☆518Updated 6 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆236Updated 8 years ago
- Fancy Bear Source Code☆260Updated 8 years ago
- A memory scanning evasion technique☆853Updated 7 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆986Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 6 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆447Updated 6 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆496Updated 5 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆362Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago