MatheuZSecurity / InfectorLinks
This is a simple process injection made in C for Linux systems
☆26Updated last year
Alternatives and similar repositories for Infector
Users that are interested in Infector are comparing it to the libraries listed below
Sorting:
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆24Updated last month
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆35Updated 6 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 6 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆58Updated 6 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆55Updated 7 months ago
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- Splitting and executing shellcode across multiple pages☆103Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 9 months ago
- Make an Linux Kernel rootkit visible again.☆52Updated 3 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated last year
- ☆34Updated 2 months ago
- in-process powershell runner for BRC4☆45Updated last year
- A pure C version of SymProcAddress☆26Updated last year
- ☆59Updated last year
- Cortex EDR Ransomware protection Bypass☆24Updated 3 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- API Hammering with C++20☆46Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 11 months ago
- Attacking the cleanup_module function of a kernel module☆36Updated 2 months ago
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆90Updated 7 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 3 weeks ago
- Various methods of executing shellcode☆70Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year