Load static-compiled PE from remote server.
☆68Jan 8, 2022Updated 4 years ago
Alternatives and similar repositories for PEMemoryLoader
Users that are interested in PEMemoryLoader are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,028Aug 29, 2023Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆306Aug 2, 2023Updated 2 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆721Mar 4, 2023Updated 3 years ago
- Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscal…☆323Aug 2, 2023Updated 2 years ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆312Aug 2, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆180Feb 10, 2023Updated 3 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆204Aug 2, 2023Updated 2 years ago
- Rookit and anti rookit on Windows platform☆14Apr 30, 2024Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆75Feb 11, 2024Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 4 years ago
- A Beacon Object File (BOF) template for Visual Studio☆281Nov 24, 2025Updated 5 months ago
- Patching AmsiOpenSession by forcing an error branching☆154Aug 2, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆18Jan 17, 2022Updated 4 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Exploring in-memory execution of .NET☆141Apr 20, 2022Updated 4 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆12Jun 8, 2023Updated 2 years ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆725Jul 19, 2023Updated 2 years ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆82Mar 7, 2026Updated 2 months ago
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆248Aug 2, 2023Updated 2 years ago
- ☆62Jan 9, 2023Updated 3 years ago
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Windows x64 kernel mode rootkit process hollowing POC.☆193Jun 30, 2023Updated 2 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆446Aug 2, 2023Updated 2 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆945Mar 28, 2021Updated 5 years ago
- more conveniently Visual-Studio-BOF-template☆76Sep 12, 2023Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆82Nov 6, 2021Updated 4 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A simple Sleepmask BOF example☆173Nov 24, 2025Updated 5 months ago
- miscellaneous scripts and programs☆285May 13, 2026Updated last week
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆174Apr 27, 2023Updated 3 years ago
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆400Jan 9, 2024Updated 2 years ago
- x86指令去混淆脚本,基于ida,capstone☆15Aug 14, 2021Updated 4 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year