andreafortuna / pycodeinjectorLinks
Python code injection library
☆10Updated 6 years ago
Alternatives and similar repositories for pycodeinjector
Users that are interested in pycodeinjector are comparing it to the libraries listed below
Sorting:
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 9 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 7 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆53Updated 7 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- ☆45Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- A Linux RAT in C☆35Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- MS Word MS WordPad via IE VBS Engine RCE☆7Updated 7 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 5 years ago
- ☆24Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆138Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- import pyd or execute PE all from memory using only pure python code and some shellcode tricks☆74Updated 8 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago