XaFF-XaFF / Heap-Injection
Example of C# heap injector for x64 and x86 shellcodes
☆13Updated last year
Related projects: ⓘ
- Simple keylogger written in C# which is ready for modifications.☆12Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated 11 months ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆56Updated last year
- ☆23Updated this week
- API Hammering with C++20☆34Updated 2 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆22Updated 3 months ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆14Updated last year
- Change hash for a signed pe☆15Updated last year
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆14Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆36Updated 6 months ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆52Updated 4 months ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆42Updated last year
- Fud Runpe Av Evasion / All Av Bypass☆31Updated last year
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆45Updated last year
- Overwrite MBR and add own custom message☆13Updated 4 years ago
- Akame is an open-source, UD shellcode loader written in C++17.☆19Updated 2 months ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- ☆11Updated this week
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated last year
- A Bumblebee-inspired Crypter☆79Updated last year
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆12Updated 4 years ago
- Offensive Assembly code snippets.☆10Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆35Updated 4 months ago
- A simple PE loader.☆25Updated last year
- ☆12Updated this week
- ☆50Updated this week