Process injection via KernelCallbackTable
☆14Jan 28, 2022Updated 4 years ago
Alternatives and similar repositories for 2022-01-24-malware-injection-15
Users that are interested in 2022-01-24-malware-injection-15 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆21Jul 24, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆36Jun 5, 2022Updated 3 years ago
- Inject dll to explorer.exe and hide file from process.☆23Apr 24, 2021Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- ☆29Aug 24, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Sep 3, 2022Updated 3 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆13May 31, 2024Updated last year
- Decoder for VMProtect hwids☆18Aug 1, 2022Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- A program to steal user information through a simple link☆14May 19, 2023Updated 2 years ago
- ☆19Sep 17, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- IDA Pro 7.5 leak☆17Jan 2, 2021Updated 5 years ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- An example of PE hollowing injection technique☆26Jun 28, 2019Updated 6 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Mar 3, 2022Updated 4 years ago
- KoiVM,EazVM,AgileVM Patcher Por "Team Venturi77"☆18Aug 16, 2019Updated 6 years ago
- A Bumblebee-inspired Crypter☆80Dec 5, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Public scripts etc.☆19Jan 14, 2024Updated 2 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- A Python backdoor for spying on Windows machines☆10Apr 21, 2022Updated 3 years ago
- Vulnerabilities exploitation examples, python☆23May 22, 2023Updated 2 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago