S12cybersecurity / NinjaInjectorLinks
Classic Process Injection with Memory Evasion Techniques implemantation
☆73Updated 2 years ago
Alternatives and similar repositories for NinjaInjector
Users that are interested in NinjaInjector are comparing it to the libraries listed below
Sorting:
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆60Updated 5 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆94Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆120Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆132Updated last month
- EvtPsst☆55Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Various methods of executing shellcode☆72Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆84Updated 2 years ago
- ☆122Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Do some DLL SideLoading magic☆89Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆146Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆180Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- ☆60Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 10 months ago
- Direct syscalls Injection to bypass AV/EDR☆12Updated last year
- Automated .NET AppDomain hijack payload generation☆127Updated 8 months ago
- I have documented all of the AMSI patches that I learned till now☆74Updated 7 months ago
- Create Anti-Copy DRM Malware☆67Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆63Updated 2 years ago