Dodgy reflective DLL injector PoC for 32-bit Windows
☆17Aug 20, 2018Updated 7 years ago
Alternatives and similar repositories for Lynx
Users that are interested in Lynx are comparing it to the libraries listed below
Sorting:
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- Program to leak anti-virus behaviour and such☆14Apr 18, 2019Updated 6 years ago
- Detect HTTP packet and inject redirect packet☆14Mar 1, 2018Updated 8 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- PoC for detecting and dumping process hollowing code injection☆52Oct 23, 2018Updated 7 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Jan 15, 2014Updated 12 years ago
- Kernel-mode file scanner☆19Jul 16, 2018Updated 7 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Feb 14, 2014Updated 12 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆76Jul 16, 2018Updated 7 years ago
- Introductory software reverse engineering tutorial for beginners☆36Jun 2, 2019Updated 6 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Oct 23, 2018Updated 7 years ago
- Dll injector POC for new handle stealing technique☆21Oct 8, 2017Updated 8 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- DLL Injection commandline utility☆26Mar 14, 2013Updated 12 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆44Oct 3, 2018Updated 7 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- A repository where I share my injection implemintations☆29Jul 26, 2020Updated 5 years ago
- Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument…☆15Mar 4, 2018Updated 8 years ago
- A tool to dump informations about the caller of a function.☆14Oct 4, 2016Updated 9 years ago
- A Cheat I Made Using C# In My Free Time Trying To Improve Myself. Enjoy!☆12Nov 5, 2020Updated 5 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- ECIES implementation in C using MbedTLS☆15Aug 18, 2025Updated 6 months ago
- Handy WMI query tool.☆12Jun 20, 2016Updated 9 years ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆60Sep 14, 2020Updated 5 years ago
- The dll that can hide itself and then delete itselft.☆32Mar 31, 2013Updated 12 years ago