S12cybersecurity / NinjaInjectorLinks
Classic Process Injection with Memory Evasion Techniques implemantation
☆71Updated last year
Alternatives and similar repositories for NinjaInjector
Users that are interested in NinjaInjector are comparing it to the libraries listed below
Sorting:
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆76Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆25Updated 11 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 3 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆27Updated 9 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- Various methods of executing shellcode☆71Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆180Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 10 months ago
- ☆59Updated last year
- Splitting and executing shellcode across multiple pages☆101Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- EvtPsst☆55Updated last year
- ☆124Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆37Updated 3 months ago
- Do some DLL SideLoading magic☆86Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Create Anti-Copy DRM Malware☆63Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆65Updated last year
- Rewrite to fit my needs☆30Updated last year
- Offensive Windows Kernel Toolset☆126Updated last month