MalwareTech / CreateDesktop
Example application for creating multiple desktops on Windows
☆130Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for CreateDesktop
- Inject code into a legitimate process☆143Updated 9 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆316Updated 7 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆216Updated last year
- Passive UAC elevation using dll infection☆71Updated 10 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆92Updated 3 years ago
- A C/C++ implementation of Microsoft's Antimalware Scan Interface☆170Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆223Updated 5 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆228Updated 4 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆320Updated 7 years ago
- PoC designed to evade userland-hooking anti-virus.☆85Updated 5 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆114Updated 7 years ago
- Universal Unhooking☆316Updated 6 years ago
- Carberp Banking Trojan☆110Updated 9 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆155Updated 5 years ago
- Reflective PE loader for DLL injection☆167Updated 7 years ago
- PoC dlls for Task Scheduler COM Hijacking☆90Updated 8 years ago
- Demos of various (also non standard) persistence methods used by malware☆219Updated last year
- C++☆79Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆359Updated 7 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 8 years ago
- Process Doppelgänging☆154Updated 6 years ago
- Simple 32/64-bit PEs loader.☆136Updated 5 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆126Updated 8 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆82Updated 4 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆89Updated 5 years ago
- Contains some tricks to detect Sandboxes and gradually completed☆44Updated 7 years ago