PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts
☆25Aug 17, 2018Updated 7 years ago
Alternatives and similar repositories for Win-Exploit-Inject
Users that are interested in Win-Exploit-Inject are comparing it to the libraries listed below
Sorting:
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Saurik remote control software opensource, X30 is now available.☆37Oct 17, 2022Updated 3 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Feb 12, 2022Updated 4 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Microsoft Redistributable Download & Installer☆18Oct 14, 2019Updated 6 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Small class to help perform syscalls.☆21May 15, 2025Updated 9 months ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- ☆19Mar 21, 2020Updated 5 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Jul 12, 2018Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- WinHTTP Async demo☆13Jan 13, 2023Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆16Feb 13, 2024Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- OUTDATED☆11Mar 8, 2020Updated 5 years ago
- demo for kcp☆16Mar 31, 2018Updated 7 years ago
- P2C Loader based on blackbone, used by isolation.top and others.☆13Jan 2, 2018Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago