aaaddress1 / Win-Exploit-InjectLinks
PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts
☆25Updated 6 years ago
Alternatives and similar repositories for Win-Exploit-Inject
Users that are interested in Win-Exploit-Inject are comparing it to the libraries listed below
Sorting:
- Remote PE reflective injection with a simple reflective loader☆31Updated 6 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆45Updated 7 years ago
- ☆63Updated 2 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆29Updated 4 years ago
- ☆15Updated 4 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 5 years ago
- ☆36Updated 3 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- ☆31Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- ☆36Updated 6 years ago
- Rite Of Passage ROP Injector☆34Updated 5 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 6 years ago
- Windows API Hashes used in the malwares☆42Updated 9 years ago
- Process Hollowing POC in CPP☆16Updated 4 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- Example RPC service for blog post☆17Updated 6 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆41Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆40Updated 4 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆30Updated 3 years ago
- Non organized Cpp code files I used for my research on Windows☆25Updated 4 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆96Updated 5 years ago
- ☆70Updated 5 months ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- ☆22Updated 5 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- Use NT Native Registry API to create a registry that normal user can not query.☆92Updated 7 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆98Updated 5 years ago