fatihsnsy / DLInjector-GUILinks
DLInjector for Graphical User Interface.
☆35Updated 4 years ago
Alternatives and similar repositories for DLInjector-GUI
Users that are interested in DLInjector-GUI are comparing it to the libraries listed below
Sorting:
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
 - CVE-2020-1048 bypass: binary planting PoC☆33Updated 5 years ago
 - A quick tool for hiding a new process running shellcode.☆57Updated 5 years ago
 - jgraphx 4.0.4 build for cs project☆22Updated 5 years ago
 - Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
 - Linux x86_64 Process Injection Utility☆58Updated 4 years ago
 - gui uac bypass (netplwiz.exe)☆66Updated 6 years ago
 - adding a backdooruser using win32api☆80Updated 5 years ago
 - A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 6 years ago
 - ☆50Updated 5 years ago
 - Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
 - This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆19Updated 5 years ago
 - CVE-2019-1064 Local Privilege Escalation Vulnerability☆24Updated 6 years ago
 - Video files for eBook: "Bypassing AVs by C#.NET Programming"☆40Updated 2 years ago
 - PoC for CVE-2020-1015☆39Updated 5 years ago
 - Clear All Windows System Logs - AntiForensics☆53Updated 10 years ago
 - Red Team C2 and Post Exploitation code☆36Updated 3 months ago
 - SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
 - Proof of concept of VMSA-2017-0012☆41Updated 8 years ago
 - a open source rat from china☆26Updated 9 years ago
 - Exploits, Exploits, Exploits and more Exploits!☆33Updated 4 years ago
 - Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago
 - ☆35Updated 3 years ago
 - Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
 - This repository contains some details about abusing outlook.☆27Updated 7 years ago
 - ☆21Updated 5 years ago
 - Simple C implementation to perform shellcode process injection via win32 APIs☆62Updated 5 years ago
 - sploit☆67Updated 5 years ago
 - Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Updated 6 years ago
 - The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago