fatihsnsy / DLInjector-GUI
DLInjector for Graphical User Interface.
☆33Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for DLInjector-GUI
- DLL injector. Catch process by name, quickly inject...☆11Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Updated 5 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- A quick tool for hiding a new process running shellcode.☆54Updated 4 years ago
- A repo to hold any bypasses I work on/study/whatever☆18Updated 3 years ago
- C2 and Post Exploitation Code☆34Updated 2 weeks ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆22Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- An Advanced C# .NET Rat, It’s Stable and Contains Many Features.☆7Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆36Updated 3 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Explanation and PoC for CVE-2020-16152☆12Updated 4 years ago
- Working exploit code for CVE-2019-17625☆17Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- 🔅 Reverse shell written on python3☆16Updated 3 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆18Updated 5 years ago