KX-Lau / PELoaderLinks
简单版的PE加载器
☆12Updated 5 years ago
Alternatives and similar repositories for PELoader
Users that are interested in PELoader are comparing it to the libraries listed below
Sorting:
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- 自用的shellcode生成框架☆32Updated 2 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆15Updated 2 years ago
- Beacon compiled using clang☆72Updated 2 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆61Updated 2 weeks ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆40Updated 6 months ago
- Hide Port In Windows☆42Updated last year
- ☆43Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆56Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- ☆32Updated 5 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆67Updated 3 months ago
- bypass UAC even when configured to always notify user☆29Updated 4 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- UAC_wenpon☆49Updated 4 years ago
- Reflective DLL injection Execution☆20Updated 3 years ago
- My personal shellcode loader☆32Updated 2 years ago
- An implementation of an indirect system call☆131Updated 2 years ago
- use aswArPot.sys to kill process☆69Updated 3 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆19Updated 3 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆63Updated 4 years ago
- ☆19Updated 3 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆48Updated 4 years ago
- vehsyscall:a syscall project that may bypass EDR☆61Updated last year
- Code with Windows Hacker☆12Updated 3 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆12Updated 3 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- DLL Unhooking☆13Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆44Updated 3 years ago