A simple Dll Injection demonstration
☆121May 13, 2017Updated 8 years ago
Alternatives and similar repositories for StandardInjection
Users that are interested in StandardInjection are comparing it to the libraries listed below
Sorting:
- ☆14Oct 31, 2016Updated 9 years ago
- a Simple CRC32 hash algorithm☆14Dec 29, 2016Updated 9 years ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆86Dec 29, 2016Updated 9 years ago
- A Simple demonstration of manual dll injector☆208May 27, 2021Updated 4 years ago
- A simple program to demonstrate external signature scanning.☆70Jun 7, 2022Updated 3 years ago
- A simple project to demonstrate function hooking / detouring☆127Apr 2, 2017Updated 8 years ago
- A simple program that uses an overlapping window to create a melting screen effect.☆40Dec 29, 2016Updated 9 years ago
- Simple algorithm to brute force CRC32 hashes☆16Dec 29, 2016Updated 9 years ago
- A simple program to scan for open handles in a process.☆61Dec 29, 2016Updated 9 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆276Nov 8, 2016Updated 9 years ago
- Cheat that uses a driver instead WinAPI for Reading / Writing memory.☆755Jul 4, 2021Updated 4 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Code that allows running another windows PE in the same address space as the host process.☆456Nov 7, 2016Updated 9 years ago
- ☆12Dec 1, 2021Updated 4 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- Extract credentials and other useful info from network captures☆78Nov 3, 2022Updated 3 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Sep 3, 2019Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- HTTPBotNet☆20Mar 21, 2025Updated 11 months ago
- Malwares are here☆25Jan 16, 2025Updated last year
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- I made this malware for educational purpouses. It overwrites the bootsector and shows some GDI-Effects and play some Bytebeats☆10Feb 2, 2022Updated 4 years ago
- (Skidded) Malware by Clxcq. Neither i or clxcq are responsible for any damage☆12Jun 11, 2022Updated 3 years ago
- ☆13Oct 10, 2022Updated 3 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆474Dec 21, 2019Updated 6 years ago
- Hallucinate is a trojan malware (for educational purposes) similar to Maya Gold.scr and Mist. The source code will be released after Ende…☆14Jun 8, 2022Updated 3 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Dec 17, 2018Updated 7 years ago
- Simple tool that allows add custom function (with custom dll) to PE-file import section☆11Apr 23, 2019Updated 6 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago