☆95Nov 16, 2024Updated last year
Alternatives and similar repositories for Linux-Process-Injection
Users that are interested in Linux-Process-Injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A few examples of how to trap virtual memory access on Windows.☆42Dec 18, 2024Updated last year
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- Linux process injection PoCs☆29Apr 30, 2024Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 4 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆17Jun 7, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆59Nov 20, 2023Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆50May 12, 2021Updated 4 years ago
- Evasion by machine code de-optimization.☆418Jul 22, 2024Updated last year
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago
- x64dbg Automate's Python Client - Easy Scriptable and Repeatable Debug Sessions☆29Mar 18, 2026Updated last week
- Leveraging LLM to generate Java deserialization chains☆52Mar 12, 2026Updated 2 weeks ago
- Linux based inter-process code injection without ptrace(2)☆258Aug 24, 2017Updated 8 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- Zero-dependency MCP server implementation.☆74Feb 23, 2026Updated last month
- A collection of position independent coding resources☆109Nov 15, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆134May 17, 2023Updated 2 years ago
- My attempt to access x86 hardware without interference from modern OS, just like the old days :)☆19Jul 4, 2022Updated 3 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆928Jul 20, 2024Updated last year
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆90Oct 6, 2020Updated 5 years ago
- Linux Sleep Obfuscation☆113Jan 7, 2024Updated 2 years ago
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆116Jun 12, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 9 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year