PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts
☆25Aug 17, 2018Updated 7 years ago
Alternatives and similar repositories for Win-Exploit-Inject
Users that are interested in Win-Exploit-Inject are comparing it to the libraries listed below
Sorting:
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Feb 12, 2022Updated 4 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Saurik remote control software opensource, X30 is now available.☆37Oct 17, 2022Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆29Aug 5, 2019Updated 6 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Microsoft Redistributable Download & Installer☆19Oct 14, 2019Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- ☆19Mar 21, 2020Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 6 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Next gen process injection technique☆54Jul 9, 2020Updated 5 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆466Aug 23, 2023Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Small class to help perform syscalls.☆21May 15, 2025Updated 10 months ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Exploits Intel's signed iqvw64e.sys driver to allow manual mapping and read/writing of memory at a kernel level.☆13Jun 1, 2019Updated 6 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Jul 12, 2018Updated 7 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago