32 bit process inject shellcode to 32 bit process and 64 bit process
☆35May 8, 2023Updated 2 years ago
Alternatives and similar repositories for CrossInject
Users that are interested in CrossInject are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Change hash for a signed pe☆18Jul 18, 2023Updated 2 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆22Jan 28, 2021Updated 5 years ago
- 重构Beacon☆15Aug 25, 2024Updated last year
- Burpsuite extension. Supports ASP.NET ViewStateDecoder☆33Mar 1, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆134May 17, 2023Updated 2 years ago
- ☆28Aug 12, 2023Updated 2 years ago
- PoC kernel to usermode injection☆111Feb 26, 2024Updated 2 years ago
- ☆27Sep 13, 2023Updated 2 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Basic Psexec clone, but in golang.☆17Jul 2, 2022Updated 3 years ago
- GitHubApi CVE Poc监控工具☆14Jan 23, 2026Updated 2 months ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Apr 29, 2024Updated last year
- Rust 重构的 sRDI☆18Sep 9, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Standalone Metasploit-like XOR encoder for shellcode☆52May 12, 2024Updated last year
- That guy uses python to bypass anti-virus, goddamn!基于python pyd的shellcode免杀绕过☆65Jun 27, 2023Updated 2 years ago
- Resolve the issue of DLLmain function in white and black DLLs hanging when calling shellcode☆205May 28, 2024Updated last year
- This is my own implementation of the Perun's Fart technique by Sektor7☆73May 14, 2022Updated 3 years ago
- Remotely dump NT hashes through Windows Crash dumps☆33Oct 29, 2024Updated last year
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Jun 18, 2023Updated 2 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆12Dec 26, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A small x64 library to load dll's into memory.☆461Nov 6, 2023Updated 2 years ago
- ☆18Nov 23, 2023Updated 2 years ago
- Repo containing my public talks☆23May 30, 2023Updated 2 years ago
- 添加计划任务方法集合☆310Aug 6, 2023Updated 2 years ago
- Take a screenshot without injection for Cobalt Strike☆205Jun 7, 2023Updated 2 years ago
- ☆56Nov 21, 2022Updated 3 years ago
- A nim implementation of sRDI☆20Oct 18, 2023Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago
- indirect syscalls for AV/EDR evasion in Go assembly☆378Jun 13, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Simple Proof Code for Extracting and Executing Shellcode from Event Logs☆27Mar 5, 2023Updated 3 years ago
- apache-shiro-exploit☆31Nov 16, 2023Updated 2 years ago
- 基于污点分析和模拟栈帧技术的JSP Webshell检测☆48Sep 30, 2025Updated 6 months ago
- A collection of weaponized LPE exploits written in Go☆53Jan 23, 2025Updated last year
- ExploitDB toolkit ExploitDB辅助工具☆11Jul 27, 2021Updated 4 years ago
- An implementation of an indirect system call☆132Aug 25, 2023Updated 2 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago