This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.
☆27Jul 26, 2024Updated last year
Alternatives and similar repositories for PEB_WALK_AND_API_OBFUSCATION_INJECTION
Users that are interested in PEB_WALK_AND_API_OBFUSCATION_INJECTION are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- Change hash for a signed pe☆18Jul 18, 2023Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Small project to facilitate creation of .lnk payloads☆82Nov 18, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple present scene, kernel allocation injector.☆27Jun 12, 2022Updated 3 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specifi…☆21Jul 9, 2024Updated last year
- .NET assembly loader with patching AMSI and ETW bypass☆33Apr 16, 2025Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- ☆24Jul 15, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆274Oct 31, 2024Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- EventViewer Bypass Uac Bof☆23Jul 23, 2022Updated 3 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆30Dec 31, 2021Updated 4 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- ☆131Jun 28, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- W/RPM Driver and usermode for Linux☆20Oct 31, 2023Updated 2 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- shamelessly ripped from https://github.com/khalilbijjou/WAFNinja/☆19Dec 16, 2016Updated 9 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ☆12Nov 12, 2023Updated 2 years ago
- Collection of random RedTeam scripts.☆212Mar 8, 2024Updated 2 years ago
- Utilities for obfuscating shellcode☆102Mar 24, 2026Updated last month
- ☆77Apr 8, 2026Updated 3 weeks ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆158May 22, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Mar 3, 2024Updated 2 years ago
- My Awesome List☆12Updated this week
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62May 3, 2024Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Feb 22, 2023Updated 3 years ago
- Red Teaming Tradecraft☆34Sep 28, 2022Updated 3 years ago
- 一个界面基于IMGUI的ARK,目前R3实现☆13Nov 1, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago