Packet crafting, injection and sniffing tool
☆70Jan 8, 2026Updated last month
Alternatives and similar repositories for inject
Users that are interested in inject are comparing it to the libraries listed below
Sorting:
- Lightweight and fast SOCKS5 proxy server☆10Feb 9, 2026Updated 3 weeks ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- ☆14Aug 18, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆52Aug 22, 2022Updated 3 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 2 years ago
- 🌵 Command and Action routine Server☆16Updated this week
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- ☆44Jul 11, 2023Updated 2 years ago
- Hides processes from the windows task manager using IAT hooking.☆22Mar 30, 2021Updated 4 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Sep 7, 2024Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 3 months ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 3 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆47Jan 28, 2023Updated 3 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- Multipurpose malware framework☆28Dec 6, 2021Updated 4 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.☆39Aug 30, 2022Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆103May 11, 2022Updated 3 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated last month
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago