S12cybersecurity / NinjaInjectorLinks
Classic Process Injection with Memory Evasion Techniques implemantation
☆72Updated 2 years ago
Alternatives and similar repositories for NinjaInjector
Users that are interested in NinjaInjector are comparing it to the libraries listed below
Sorting:
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆101Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆75Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆124Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆38Updated last month
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- Do some DLL SideLoading magic☆89Updated 2 years ago
- ☆122Updated 2 years ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆126Updated last month
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆135Updated 3 months ago
- EvtPsst☆55Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Updated 2 years ago
- Various methods of executing shellcode☆73Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated 2 years ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆84Updated 2 weeks ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 6 months ago