Remote PE reflective injection with a simple reflective loader
☆32Jun 28, 2019Updated 6 years ago
Alternatives and similar repositories for PEReflectiveInjection
Users that are interested in PEReflectiveInjection are comparing it to the libraries listed below
Sorting:
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- ☆65Nov 12, 2022Updated 3 years ago
- Convert PE files to a shellcode☆81May 7, 2020Updated 5 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆32Jun 15, 2019Updated 6 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- Скрытие Win API☆27Aug 14, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆65Updated this week
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Sep 26, 2019Updated 6 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- ☆15Aug 23, 2020Updated 5 years ago