☆65Nov 12, 2022Updated 3 years ago
Alternatives and similar repositories for ProcessHide
Users that are interested in ProcessHide are comparing it to the libraries listed below
Sorting:
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Convert PE files to a shellcode☆81May 7, 2020Updated 5 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- Obfuscate specific windows apis with different apis☆1,022Feb 21, 2021Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- Simple windows API logger☆109Sep 19, 2019Updated 6 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- A quick tool for hiding a new process running shellcode.☆57Jun 10, 2020Updated 5 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- PoC MSVC COFF Object file loader/injector.☆184Mar 19, 2021Updated 5 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- ☆37May 9, 2019Updated 6 years ago
- c++ implementation of windows heavens gate☆71Feb 12, 2021Updated 5 years ago
- Kernel file/process/object tool☆69Aug 4, 2021Updated 4 years ago
- Saurik remote control software opensource, X30 is now available.☆37Oct 17, 2022Updated 3 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆72Feb 11, 2024Updated 2 years ago