64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.
☆132Mar 8, 2023Updated 3 years ago
Alternatives and similar repositories for winx64-InjectAllProcessesMeterpreter-Shellcode
Users that are interested in winx64-InjectAllProcessesMeterpreter-Shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆290Mar 8, 2023Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆381Mar 8, 2023Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 4 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆516Jul 15, 2022Updated 3 years ago
- ☆28Aug 24, 2025Updated 8 months ago
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Simple EDR implementation to demonstrate bypass☆182May 27, 2020Updated 5 years ago
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆336Jan 16, 2022Updated 4 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆300Sep 28, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆107Mar 8, 2023Updated 3 years ago
- ☆18Mar 20, 2017Updated 9 years ago
- A tool to kill antimalware protected processes☆1,511Jun 19, 2021Updated 4 years ago
- Evasive Process Hollowing Techniques☆142Aug 16, 2020Updated 5 years ago
- Executes position independent shellcode from an encrypted zip☆304Dec 22, 2020Updated 5 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆147Aug 16, 2021Updated 4 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆826Aug 23, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆691Mar 11, 2024Updated 2 years ago
- It stinks☆103Apr 22, 2022Updated 4 years ago
- ☆780Oct 17, 2023Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆164Mar 14, 2021Updated 5 years ago
- Small and convenient C2 tool for Windows targets☆614Mar 8, 2022Updated 4 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,412Nov 22, 2023Updated 2 years ago
- SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.☆321Jul 1, 2021Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆332Oct 9, 2021Updated 4 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆822Jul 26, 2021Updated 4 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,205Apr 16, 2025Updated last year
- Hide your payload in DNS☆613May 3, 2023Updated 2 years ago
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago