Lexsek / ProcessInjectionToolLinks
Process injection tool, in order to explain how different process injection methods works and cool tricks with WINAPI.
☆23Updated 6 years ago
Alternatives and similar repositories for ProcessInjectionTool
Users that are interested in ProcessInjectionTool are comparing it to the libraries listed below
Sorting:
- A repository where I share my injection implemintations☆29Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Rite Of Passage ROP Injector☆34Updated 5 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 5 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated last month
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Some simple process injection techniques targeting the Windows platform☆31Updated 5 years ago
- ☆31Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 10 months ago
- ☆24Updated 3 years ago
- ☆91Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- ☆22Updated 4 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- ☆36Updated 6 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆91Updated 6 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- ☆48Updated 5 years ago
- POC code to crash Windows Event Logger Service☆27Updated 4 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 5 years ago
- Simple skeleton for a CPP DLL☆36Updated 5 years ago