hasherezade / dll_to_exeView external linksLinks
Converts a DLL into EXE
☆820Jul 23, 2023Updated 2 years ago
Alternatives and similar repositories for dll_to_exe
Users that are interested in dll_to_exe are comparing it to the libraries listed below
Sorting:
- Converts a EXE into DLL☆1,360Sep 15, 2025Updated 4 months ago
- Converts PE into a shellcode☆2,734Aug 30, 2025Updated 5 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,550Oct 31, 2025Updated 3 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,310Oct 31, 2025Updated 3 months ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,323Oct 31, 2025Updated 3 months ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆682Mar 11, 2024Updated last year
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,497Nov 15, 2023Updated 2 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,452Jul 8, 2025Updated 7 months ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆937Mar 28, 2021Updated 4 years ago
- AV/EDR evasion via direct system calls.☆1,985Jan 1, 2023Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 4 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆228Mar 22, 2023Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,422Jul 20, 2024Updated last year
- Demos of various injection techniques found in malware☆797Feb 15, 2022Updated 3 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated last year
- LSASS memory dumper using direct system calls and API unhooking.☆1,577Jan 5, 2021Updated 5 years ago
- Also known by Microsoft as Knifecoat☆1,151Dec 22, 2022Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆637Aug 30, 2022Updated 3 years ago
- Open-Source Shellcode & PE Packer☆2,063Feb 3, 2024Updated 2 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆785Jun 23, 2022Updated 3 years ago
- Payload Generation Framework☆1,956Aug 21, 2024Updated last year
- SharpSploit is a .NET post-exploitation library written in C#☆1,859Aug 12, 2021Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆796Sep 13, 2025Updated 5 months ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- ☆825Dec 28, 2019Updated 6 years ago
- C/C++ source obfuscator for antivirus bypass☆1,060Mar 10, 2022Updated 3 years ago
- Shellcode Compiler☆1,147Sep 1, 2024Updated last year
- Portable Executable parsing library (from PE-bear)☆659Oct 4, 2025Updated 4 months ago
- A tool to elevate privilege with Windows Tokens☆1,055Oct 6, 2023Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,822Mar 17, 2021Updated 4 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆839Oct 3, 2021Updated 4 years ago
- A Pin Tool for tracing API calls etc☆1,612Nov 25, 2025Updated 2 months ago
- UAC bypass, Elevate, Persistence methods☆2,736Feb 13, 2023Updated 3 years ago
- A tool to create a JScript file which loads a .NET v2 assembly from memory.☆1,316Jan 18, 2021Updated 5 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆808Jul 6, 2020Updated 5 years ago