DLL Hijacking Detection Tool
☆544Aug 6, 2019Updated 6 years ago
Alternatives and similar repositories for DLLSpy
Users that are interested in DLLSpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adaptive DLL hijacking / dynamic export forwarding☆812Jul 6, 2020Updated 5 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆788Jun 23, 2022Updated 3 years ago
- DLL and PowerShell script to assist with finding DLL hijacks☆341Oct 1, 2020Updated 5 years ago
- A shellcode function to encrypt a running process image when sleeping.☆338Sep 11, 2021Updated 4 years ago
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆553Sep 15, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,268Aug 27, 2023Updated 2 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,513Nov 15, 2023Updated 2 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆128May 25, 2021Updated 4 years ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- .NET Project for Attacking vCenter☆557Nov 11, 2021Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,437Jul 20, 2024Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,166Mar 31, 2021Updated 5 years ago
- C# Reflective loader for unmanaged binaries.☆445Jan 25, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,619Jul 10, 2023Updated 2 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆225Sep 13, 2022Updated 3 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆256Jun 25, 2023Updated 2 years ago
- ☆153Jan 6, 2023Updated 3 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆595Jul 26, 2021Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,535Jul 8, 2025Updated 9 months ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆493May 13, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tool to bypass LSA Protection (aka Protected Process Light)☆991Dec 4, 2022Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,409Nov 22, 2023Updated 2 years ago
- AV/EDR evasion via direct system calls.☆1,810Sep 3, 2022Updated 3 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,019Nov 7, 2021Updated 4 years ago
- AV/EDR evasion via direct system calls.☆2,001Jan 1, 2023Updated 3 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Beacon Object File (BOF) Creation Helper☆235May 3, 2022Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆744Jul 22, 2023Updated 2 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆822Dec 14, 2023Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks☆1,708Nov 11, 2022Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,746Jan 16, 2026Updated 2 months ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- TCP Port Redirection Utility☆768Jan 31, 2023Updated 3 years ago
- PE loader with various shellcode injection techniques☆449Oct 17, 2022Updated 3 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago