Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target process and get the target process to execute the injected code.
☆14Jun 15, 2023Updated 2 years ago
Alternatives and similar repositories for PSInjector
Users that are interested in PSInjector are comparing it to the libraries listed below
Sorting:
- Examples of different vulnerabilities, in a variety of languages, shapes and sizes.☆29Mar 7, 2024Updated 2 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- ☆12Mar 18, 2025Updated last year
- ☆19Dec 12, 2023Updated 2 years ago
- FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent, VSCode Agent, Dia Browser & Trae AI (And other Open Sourc…☆17May 31, 2025Updated 9 months ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated this week
- ☆12Aug 1, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- 🔮 Python Remote administration tool via telegram☆56Apr 21, 2025Updated 11 months ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆14Aug 12, 2017Updated 8 years ago
- Suna - Open Source Generalist AI Agent☆12Apr 29, 2025Updated 10 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Create custom Autorun.inf for removable media☆12Apr 8, 2019Updated 6 years ago
- This app provides a fast and simple way to check if your android device is rooted, with just a single click.☆16Dec 7, 2018Updated 7 years ago
- Digispark Overmaster free IDE TOOL allows to create and edit Digispark Scripts by the drag and drop technique,with cool GUI and easy to u…☆13Mar 5, 2023Updated 3 years ago
- ☆12May 12, 2024Updated last year
- ☆39May 20, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Jan 26, 2024Updated 2 years ago
- Shadow APK Crypter☆12May 31, 2025Updated 9 months ago
- My python3 implementation of a Forward Shell☆37Jan 25, 2019Updated 7 years ago
- ☆23Mar 29, 2022Updated 3 years ago
- Automated exploit scanners for public CCTV's services and other polaroid public stuff.☆24Sep 29, 2024Updated last year
- Snap of Audacity: Audio software for multi-track recording and editing☆22Dec 15, 2025Updated 3 months ago
- ☆48Feb 11, 2023Updated 3 years ago
- USB Security Software. Call the Knight to fight Malware Spread.☆14Jan 6, 2021Updated 5 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Aug 2, 2023Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago