XaFF-XaFF / Heap-Injection
Example of C# heap injector for x64 and x86 shellcodes
☆14Updated 2 years ago
Alternatives and similar repositories for Heap-Injection:
Users that are interested in Heap-Injection are comparing it to the libraries listed below
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated 2 months ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- ☆10Updated 2 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- A simple PE loader.☆25Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 10 months ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 3 years ago
- Change hash for a signed pe☆16Updated last year
- 🚧 C# UAC Bypass technique using mock directories 🚧☆29Updated 2 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆15Updated last year
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆54Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Another Portable Executable files analysing stuff☆21Updated 13 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- ☆20Updated last year
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆50Updated 2 years ago
- Process Hollowing POC in CPP☆15Updated 4 years ago
- API Hammering with C++20☆45Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- ☆16Updated 3 years ago