evilashz / RemoteMemorymodule
Load the evilDLL from socket connection without touch disk
☆16Updated 3 years ago
Alternatives and similar repositories for RemoteMemorymodule:
Users that are interested in RemoteMemorymodule are comparing it to the libraries listed below
- ☆35Updated 4 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- Loads shellcode from a resource file.☆21Updated 5 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 2 years ago
- ☆51Updated 5 years ago
- C# 编写的用于 Dropbox 文件上传☆20Updated 3 years ago
- ☆36Updated 4 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- A flexible tool that creates a minidump of the LSASS process☆13Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆38Updated 2 years ago
- UAC_wenpon☆48Updated 3 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- A simple hidden vnc.☆32Updated 4 years ago
- Kernel file/process/object tool☆66Updated 3 years ago
- DLL Unhooking☆12Updated 4 years ago
- ☆74Updated 3 years ago
- uuid-shellcode-execution☆13Updated 3 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- desktop screenshot☆29Updated last year
- Loader that loads shellcode from UUID's☆22Updated 4 years ago
- Source code RDPUploader☆19Updated 6 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- ☆32Updated 4 years ago
- Proofs-Of-360Security Sandbox Escape☆10Updated 3 years ago
- bypass BeaconEye☆88Updated 3 years ago
- Load PE via XML Attribute☆30Updated 5 years ago
- ☆10Updated 4 years ago
- backdoor c2☆38Updated 5 years ago
- inject shellcode into remote process via message hook☆15Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago