Demos of various injection techniques found in malware
☆792Feb 15, 2022Updated 4 years ago
Alternatives and similar repositories for demos
Users that are interested in demos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A more stealthy variant of "DLL hollowing"☆366Mar 8, 2024Updated 2 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆642Aug 30, 2022Updated 3 years ago
- A set of tutorials about code injection for Windows.☆313Aug 30, 2024Updated last year
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆996Feb 10, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Demos of various (also non standard) persistence methods used by malware☆225Mar 5, 2023Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,606Apr 7, 2026Updated last week
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 6 months ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,348Updated this week
- ☆828Dec 28, 2019Updated 6 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆741Mar 17, 2019Updated 7 years ago
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,905Apr 1, 2026Updated last week
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,334Apr 7, 2026Updated last week
- Converts a DLL into EXE☆815Jul 23, 2023Updated 2 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆440Aug 22, 2018Updated 7 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆827Mar 10, 2022Updated 4 years ago
- ☆407Mar 1, 2017Updated 9 years ago
- Brand New Code Injection for Windows☆740Oct 7, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Persistent IAT hooking application - based on bearparser☆265Sep 18, 2022Updated 3 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 8 years ago
- Shellcode Compiler☆1,154Sep 1, 2024Updated last year
- Portable Executable parsing library (from PE-bear)☆659Oct 4, 2025Updated 6 months ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,202Aug 1, 2019Updated 6 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,513Nov 15, 2023Updated 2 years ago
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆507Oct 8, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AV/EDR evasion via direct system calls.☆2,001Jan 1, 2023Updated 3 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆342Jul 30, 2017Updated 8 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,257Sep 3, 2022Updated 3 years ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,366Jan 22, 2022Updated 4 years ago