ZeroMemoryEx / Shellcode-Injector
x64/x86 shellcode injector
☆114Updated 2 years ago
Alternatives and similar repositories for Shellcode-Injector:
Users that are interested in Shellcode-Injector are comparing it to the libraries listed below
- x86 Trampoline Hook☆40Updated 2 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆95Updated 11 months ago
- user-mode Rootkit☆104Updated 2 years ago
- Detect API Hooks☆73Updated 2 years ago
- APT38 Tactic PoC for Stealing 0days from security professionals☆278Updated last year
- simple C++ dll injector☆59Updated 3 years ago
- Kernel Mode Driver for Elevating Process Privileges☆133Updated 2 years ago
- Bypass Malware Time Delays☆100Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆83Updated 2 years ago
- Scan for potentially vulnerable drivers☆86Updated 3 years ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆120Updated 2 years ago
- Load static-compiled PE from remote server.☆60Updated 3 years ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆166Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆81Updated last year
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆58Updated 10 months ago
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆172Updated 2 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆78Updated 3 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆111Updated 2 years ago
- Windows API Call Obfuscation☆99Updated 2 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆159Updated last year
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆133Updated 2 years ago
- My personal shellcode loader☆32Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆190Updated 9 months ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆12Updated 3 months ago