abdullah2993 / go-runpeView external linksLinks
execute a PE in the address space of another PE aka process hollowing
☆60Dec 2, 2021Updated 4 years ago
Alternatives and similar repositories for go-runpe
Users that are interested in go-runpe are comparing it to the libraries listed below
Sorting:
- Golang version of https://github.com/hasherezade/libpeconv☆29Jan 31, 2020Updated 6 years ago
- Thanks to @d35ha☆13Aug 16, 2021Updated 4 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- Reflectively load PE☆105Aug 4, 2020Updated 5 years ago
- Allow a Go process to dynamically load .NET assemblies☆150Mar 28, 2020Updated 5 years ago
- Encrypt embedded go files using age.☆49Oct 21, 2021Updated 4 years ago
- Golang packer that use process hollowing☆19May 1, 2022Updated 3 years ago
- A PoC package for hosting the CLR and executing .NET from Go☆78Jul 9, 2024Updated last year
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Convert PE files to a shellcode☆80May 7, 2020Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 5 years ago
- 无模块注 入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Simple tool that allows add custom function (with custom dll) to PE-file import section☆11Apr 23, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Oct 19, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Process Injection Techniques with Golang☆80May 29, 2020Updated 5 years ago
- Simple PE Packer Which Encrypts .text Section☆50May 28, 2017Updated 8 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- Hide malware behind a legit process C#☆129Mar 1, 2020Updated 5 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- .net based packer/obfuscator with apc based pe injection☆15Mar 23, 2016Updated 9 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Download a payload and make it run from registry without droppng.☆109Apr 9, 2019Updated 6 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Sep 26, 2019Updated 6 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Using the Windows API to mess with Task Manager in GoLANG☆15Sep 7, 2021Updated 4 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago