MatheuZSecurity / InfectorLinks
This is a simple process injection made in C for Linux systems
☆27Updated last year
Alternatives and similar repositories for Infector
Users that are interested in Infector are comparing it to the libraries listed below
Sorting:
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆108Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆40Updated 8 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆25Updated 4 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Do some DLL SideLoading magic☆86Updated last year
- Create Anti-Copy DRM Malware☆63Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆58Updated 8 months ago
- Offensive Windows Kernel Toolset☆126Updated 2 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Updated 10 months ago
- Splitting and executing shellcode across multiple pages☆101Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- random code snippets, useful for getting started☆121Updated 9 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- A bunch of scripts and code i wrote.☆143Updated 9 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆77Updated last year
- ☆145Updated 10 months ago
- Mockingjay process self injection POC☆39Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated 8 months ago
- PE obfuscator with Evasion in mind☆212Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆162Updated 8 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Command and Control (C2) framework☆130Updated 3 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆94Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year