Proof of Concept example for abusing Process Hacker 2 (v2.39.124)
☆24Oct 30, 2024Updated last year
Alternatives and similar repositories for hack-process-hacker2
Users that are interested in hack-process-hacker2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Apr 28, 2024Updated 2 years ago
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆109Jan 24, 2024Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆21Mar 11, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆29Jul 15, 2024Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 3 years ago
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 13 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- ☆12Oct 19, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 10 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 4 months ago
- A Windows token-theft utility that enumerates SYSTEM processes, duplicates their access token, and spawns a new process running as NT AUT…☆65Mar 26, 2026Updated last month
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OFFZONE 2024 Malware Persistence workshop☆23Dec 18, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ☆25Apr 28, 2024Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆41Dec 18, 2024Updated last year
- ☆61Oct 24, 2024Updated last year
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆17Jan 14, 2026Updated 3 months ago
- Windows_AFD_LPE_CVE-2023-21768☆61Aug 27, 2023Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack☆103Mar 21, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- early cascade injection PoC based on Outflanks blog post, in rust☆63Nov 8, 2024Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 2 months ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- ☆43Feb 18, 2025Updated last year
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago