JonDoNym / peinjector
peinjector - MITM PE file infector
☆603Updated 8 years ago
Alternatives and similar repositories for peinjector:
Users that are interested in peinjector are comparing it to the libraries listed below
- NetRipper - Smart traffic sniffing for penetration testers☆1,366Updated 2 years ago
- Demos of various injection techniques found in malware☆792Updated 3 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆996Updated 3 years ago
- Malware exploits☆543Updated 5 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆490Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago
- ☆518Updated 7 years ago
- A shellcode writing toolkit☆662Updated 3 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆782Updated last year
- Brand New Code Injection for Windows☆727Updated 4 years ago
- A tool to help you write binary exploits☆609Updated 6 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- A tool to detect and crash Cuckoo Sandbox☆292Updated 8 months ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆650Updated 7 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆236Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆954Updated 4 years ago
- Zero-Day Code Injection and Persistence Technique☆1,227Updated 2 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆450Updated 6 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆497Updated 5 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆559Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Updated 7 years ago
- ZeroAccess v3 toolkit☆164Updated 7 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,307Updated 3 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Updated 6 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆987Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago