☆96Nov 16, 2024Updated last year
Alternatives and similar repositories for Linux-Process-Injection
Users that are interested in Linux-Process-Injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A few examples of how to trap virtual memory access on Windows.☆42Dec 18, 2024Updated last year
- Linux process injection PoCs☆29Apr 30, 2024Updated last year
- A buffer similar to the skbuff in the kernel, but more suitable for application.☆17Sep 5, 2024Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆28Nov 23, 2025Updated 4 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Jun 7, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- ☆16Dec 7, 2025Updated 4 months ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- ☆49May 12, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Evasion by machine code de-optimization.☆423Jul 22, 2024Updated last year
- x64dbg Automate's Python Client - Easy Scriptable and Repeatable Debug Sessions☆30Mar 18, 2026Updated 3 weeks ago
- Finding Truth in the Shadows☆126Jan 26, 2023Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- Zero-dependency MCP server implementation.☆74Mar 27, 2026Updated 2 weeks ago
- A collection of position independent coding resources☆111Nov 15, 2025Updated 5 months ago
- ASLR bypass without infoleak☆167Nov 2, 2021Updated 4 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆134May 17, 2023Updated 2 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- My attempt to access x86 hardware without interference from modern OS, just like the old days :)☆19Jul 4, 2022Updated 3 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 3 years ago
- Linux Sleep Obfuscation☆114Jan 7, 2024Updated 2 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆90Oct 6, 2020Updated 5 years ago
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆116Jun 12, 2025Updated 10 months ago
- PoC Implementation of a fully dynamic call stack spoofer☆943Jul 20, 2024Updated last year
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆39Sep 22, 2024Updated last year
- Tailscale-based Windows VNC persistence tool with Session 0 isolation bypass, embedding a full WireGuard peer and RFB server into a singl…☆162Updated this week
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 10 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆185Feb 12, 2023Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago