SecurityTimes / Process-InjectionLinks
☆12Updated 5 years ago
Alternatives and similar repositories for Process-Injection
Users that are interested in Process-Injection are comparing it to the libraries listed below
Sorting:
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆91Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆81Updated 4 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆77Updated 3 years ago
- Patch AMSI and ETW in remote process via direct syscall☆83Updated 3 years ago
- Piece of code to detect and remove hooks in IAT☆65Updated 3 years ago
- Custom implementation of DbgHelp's MiniDumpWriteDump function. Uses static syscalls to replace low-level functions like NtReadVirtualMemo…☆128Updated 4 years ago
- Load static-compiled PE from remote server.☆68Updated 4 years ago
- Deleting Shadow Copies In Pure C++☆118Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆138Updated 3 years ago
- Windows API Call Obfuscation☆112Updated 3 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆113Updated 3 years ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆139Updated 3 years ago
- Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH☆69Updated 4 years ago
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆100Updated 3 years ago
- PoC for thread pool based process injection in Windows.☆120Updated 10 months ago
- The code is a pingback to the Dark Vortex blog:☆187Updated 3 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆66Updated 3 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆201Updated last year
- The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/☆206Updated 3 years ago
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆143Updated 3 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Updated 4 years ago
- WTSRM☆216Updated 3 years ago
- ☆120Updated 3 years ago
- Windows C/C++ Socks5 Server☆87Updated 3 years ago
- Reverse Socks5 proxy for windows☆16Updated 3 years ago
- A small PoC that creates processes in Windows☆186Updated last year
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Updated 4 years ago
- Experiment on reproducing Obfuscate & Sleep☆160Updated 4 years ago
- bring your own vulnerable driver☆112Updated 2 years ago