Demos of various injection techniques found in malware
☆791Feb 15, 2022Updated 4 years ago
Alternatives and similar repositories for demos
Users that are interested in demos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A more stealthy variant of "DLL hollowing"☆365Mar 8, 2024Updated 2 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆646Aug 30, 2022Updated 3 years ago
- A set of tutorials about code injection for Windows.☆313Aug 30, 2024Updated last year
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆995Feb 10, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Demos of various (also non standard) persistence methods used by malware☆226Mar 5, 2023Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,646Apr 18, 2026Updated 2 weeks ago
- A memory scanning evasion technique☆901May 24, 2017Updated 8 years ago
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 7 months ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆582Mar 8, 2024Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,353Apr 18, 2026Updated 2 weeks ago
- ☆827Dec 28, 2019Updated 6 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆740Mar 17, 2019Updated 7 years ago
- Converts PE into a shellcode☆2,760Aug 30, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆383Apr 17, 2017Updated 9 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,943Apr 1, 2026Updated last month
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,351Apr 18, 2026Updated 2 weeks ago
- Converts a DLL into EXE☆817Jul 23, 2023Updated 2 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆440Aug 22, 2018Updated 7 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆828Mar 10, 2022Updated 4 years ago
- ☆407Mar 1, 2017Updated 9 years ago
- Brand New Code Injection for Windows☆740Oct 7, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Persistent IAT hooking application - based on bearparser☆266Sep 18, 2022Updated 3 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 9 years ago
- Shellcode Compiler☆1,157Sep 1, 2024Updated last year
- Portable Executable parsing library (from PE-bear)☆658Oct 4, 2025Updated 7 months ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆693Mar 11, 2024Updated 2 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,207Aug 1, 2019Updated 6 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,519Nov 15, 2023Updated 2 years ago
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆508Oct 8, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AV/EDR evasion via direct system calls.☆2,008Jan 1, 2023Updated 3 years ago
- WinDBG Anti-RootKit Extension☆644Jul 29, 2020Updated 5 years ago
- Automated Exploit generation with WinDBG☆191Oct 18, 2016Updated 9 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆342Jul 30, 2017Updated 8 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,274Sep 3, 2022Updated 3 years ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,371Jan 22, 2022Updated 4 years ago