Execute shellcode files with rundll32
☆218Jan 28, 2024Updated 2 years ago
Alternatives and similar repositories for ExecIT
Users that are interested in ExecIT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆192Mar 4, 2024Updated 2 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆792Jan 26, 2026Updated 3 months ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆621Feb 21, 2024Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- AV bypass while you sip your Chai!☆222May 17, 2024Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆328Apr 12, 2024Updated 2 years ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆289Jan 21, 2024Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆167Jan 4, 2024Updated 2 years ago
- Native Syscalls Shellcode Injector☆268Jul 2, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆432Feb 11, 2024Updated 2 years ago
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 11 months ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆507Dec 19, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆60Dec 15, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆445Dec 21, 2023Updated 2 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- Spoofing desktop login applications with WinForms and WPF☆178Feb 19, 2024Updated 2 years ago
- Linux Sleep Obfuscation☆115Jan 7, 2024Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- RunPE implementation with multiple evasive techniques (1)