Windows Injection 101: from Zero to ROP (HITCON 2017)
☆29Aug 27, 2017Updated 8 years ago
Alternatives and similar repositories for winInject101
Users that are interested in winInject101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 7 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- Rite Of Passage ROP Injector☆35Aug 4, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Loading a native DLL in the memory.☆70Mar 15, 2018Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- ☆24Feb 14, 2024Updated 2 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- A PoC tool for exploiting leaked process and thread handles☆34Feb 13, 2024Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- GhostWriting Injection Technique.☆197Mar 26, 2018Updated 8 years ago
- PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts☆25Aug 17, 2018Updated 7 years ago
- ☆108Sep 24, 2018Updated 7 years ago
- Patching ROP-encoded shellcodes into PEs☆188Nov 22, 2017Updated 8 years ago
- ☆14Apr 16, 2022Updated 4 years ago
- Managed wrappers around the Windows API and some Native API☆35Jun 15, 2018Updated 7 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- expansion of afl-unicorn using c++☆28Aug 29, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆76Jul 16, 2018Updated 7 years ago
- ☆19Jun 20, 2019Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- A class library for reading the PE executable format in .NET.☆23Jun 24, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 6 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- ☆35Sep 5, 2017Updated 8 years ago
- Research on Anti-malware and other related security solutions☆264Jul 25, 2020Updated 5 years ago
- Dll injector POC for new handle stealing technique☆21Oct 8, 2017Updated 8 years ago