MatheuZSecurity / InfectorLinks
This is a simple process injection made in C for Linux systems
☆30Updated 2 years ago
Alternatives and similar repositories for Infector
Users that are interested in Infector are comparing it to the libraries listed below
Sorting:
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Updated 9 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- Create Anti-Copy DRM Malware☆71Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- Do some DLL SideLoading magic☆89Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- ☆79Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆135Updated 4 months ago
- ☆59Updated last year
- Reports on Driver, LSASS and other security services mitigations☆34Updated 5 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆101Updated last year
- ☆36Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 7 months ago
- ☆151Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆73Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- EvtPsst☆55Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago