☆20Jul 23, 2023Updated 2 years ago
Alternatives and similar repositories for PELoader
Users that are interested in PELoader are comparing it to the libraries listed below
Sorting:
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Convert VBS file to EXE☆17May 17, 2025Updated 10 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆92Mar 23, 2023Updated 2 years ago
- ☆87Jan 21, 2025Updated last year
- ☆126Mar 23, 2025Updated 11 months ago
- Golang implement winrm client with pass the hash☆32Apr 29, 2024Updated last year
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- A .NET malware loader, using API-Hashing to evade static analysis☆210May 30, 2023Updated 2 years ago
- An attempt at reversing WindowsDefender☆20Oct 6, 2024Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Get windows CPU temperature with WinRing0 driver and library☆25Jan 10, 2019Updated 7 years ago
- A library to hook functions !☆18Dec 2, 2021Updated 4 years ago
- A Windows C++ OLE/COM Object explorer written in WTL.☆16Feb 28, 2025Updated last year
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- Extremely simple but inefficient x86-64 assembly obfuscation.☆39Mar 1, 2016Updated 10 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆234Apr 17, 2023Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- Re-implement cmd.exe using windows api☆50Feb 7, 2023Updated 3 years ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆173Apr 27, 2023Updated 2 years ago
- ☆13Dec 10, 2020Updated 5 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- ☆19Mar 21, 2020Updated 6 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- Append custom data to signed pe file and DONOT DESTROY SIGNED STATUS.☆26Mar 13, 2021Updated 5 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- C# library to load a native DLL from memory without the need to allow unsafe code☆97Aug 5, 2019Updated 6 years ago
- ☆21Feb 19, 2021Updated 5 years ago
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Anti-Debug methods with C#☆14Dec 20, 2020Updated 5 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆48Jan 8, 2023Updated 3 years ago