MatheuZSecurity / InfectorLinks
This is a simple process injection made in C for Linux systems
☆29Updated 2 years ago
Alternatives and similar repositories for Infector
Users that are interested in Infector are comparing it to the libraries listed below
Sorting:
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆113Updated 2 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆25Updated 6 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated 10 months ago
- Do some DLL SideLoading magic☆89Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆54Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆132Updated last month
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆94Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 10 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- Create Anti-Copy DRM Malware☆67Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆123Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 10 months ago
- A repository with my code snippets for research/education purposes.☆51Updated 2 years ago
- A bunch of scripts and code i wrote.☆144Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- random code snippets, useful for getting started☆121Updated 11 months ago
- ☆78Updated 2 years ago
- ☆33Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆180Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆100Updated 7 months ago
- Erebus is a payload generator written in Nim.☆16Updated 2 years ago
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year