JonDoNym / peinjectorLinks
peinjector - MITM PE file infector
☆604Updated 9 years ago
Alternatives and similar repositories for peinjector
Users that are interested in peinjector are comparing it to the libraries listed below
Sorting:
- NetRipper - Smart traffic sniffing for penetration testers☆1,368Updated 3 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,002Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆786Updated last year
- Brand New Code Injection for Windows☆732Updated 4 years ago
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆678Updated 8 years ago
- A shellcode writing toolkit☆672Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆748Updated 6 years ago
- ☆515Updated 7 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆999Updated 7 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 11 months ago
- LLDB MCP Integration + other helpful commands☆728Updated 2 months ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆323Updated 2 years ago
- Zero-Day Code Injection and Persistence Technique☆1,234Updated 2 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- Various PoCs☆491Updated 5 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆774Updated 4 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- Malware exploits☆548Updated 5 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆955Updated 4 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆496Updated 7 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- A memory scanning evasion technique☆872Updated 8 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆407Updated 2 years ago
- A fast and stealthy credential harvester☆625Updated last year