S12cybersecurity / WindowInjectorLinks
Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection
☆20Updated 2 years ago
Alternatives and similar repositories for WindowInjector
Users that are interested in WindowInjector are comparing it to the libraries listed below
Sorting:
- Simple C++ Reverse Shell☆13Updated 2 years ago
- Malware Libraries focused in help Malware Development☆27Updated 2 years ago
- Threat Hijacking Simple Implementation☆17Updated 8 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 2 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆13Updated 2 years ago
- Very basic Web created with HTML and JavaScript to create Online Payload to do Reverse Shells☆12Updated 3 years ago
- Simple Ransoware to attack Windows 🌟☆23Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆73Updated 2 years ago
- Process injection via KernelCallbackTable☆13Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆58Updated last month
- AdminX it's a Malware to execute process as some users from a Windows OS☆12Updated 2 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 4 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Updated last year
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆24Updated 2 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆35Updated 5 months ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆18Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆33Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 3 years ago
- Hellokitty Ransomware Source Code☆17Updated 2 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 3 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Updated 3 years ago