XaFF-XaFF / Heap-InjectionLinks
Example of C# heap injector for x64 and x86 shellcodes
☆14Updated 2 years ago
Alternatives and similar repositories for Heap-Injection
Users that are interested in Heap-Injection are comparing it to the libraries listed below
Sorting:
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- A simple PE loader.☆26Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- ☆11Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- Change hash for a signed pe☆16Updated last year
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated last month
- Just another casual shellcode native loader☆24Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆50Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆56Updated 2 years ago
- ☆16Updated 3 years ago
- API Hammering with C++20☆47Updated 2 years ago
- Collection of shellcode injection and execution techniques☆17Updated 3 years ago
- Playing with packets in C#☆13Updated 9 months ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆56Updated 2 years ago