Proof of Concept example for abusing Process Hacker 2 (v2.39.124)
☆23Oct 30, 2024Updated last year
Alternatives and similar repositories for hack-process-hacker2
Users that are interested in hack-process-hacker2 are comparing it to the libraries listed below
Sorting:
- ☆24Apr 28, 2024Updated last year
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆21Mar 11, 2026Updated last week
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 12 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- ☆12Oct 19, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62May 1, 2023Updated 2 years ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Nov 23, 2023Updated 2 years ago
- PowerShell module containing commands to easily interact with the Cybereason API.☆16Jan 4, 2026Updated 2 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- steal cookies from website using xss☆12Mar 25, 2020Updated 5 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated 2 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ☆25Apr 28, 2024Updated last year
- A few examples of how to trap virtual memory access on Windows.☆42Dec 18, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆17Jan 14, 2026Updated 2 months ago
- Terminate AV/EDR leveraging BYOVD attack☆103Mar 21, 2025Updated 11 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- ☆42Feb 18, 2025Updated last year
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago