Converts a DLL into EXE
☆816Jul 23, 2023Updated 2 years ago
Alternatives and similar repositories for dll_to_exe
Users that are interested in dll_to_exe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Converts a EXE into DLL☆1,360Sep 15, 2025Updated 6 months ago
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 6 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,583Updated this week
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,345Updated this week
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,323Oct 31, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A more stealthy variant of "DLL hollowing"☆364Mar 8, 2024Updated 2 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 3 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆944Mar 28, 2021Updated 5 years ago
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 6 months ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated 2 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆641Aug 30, 2022Updated 3 years ago
- AV/EDR evasion via direct system calls.☆2,001Jan 1, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Obfuscate specific windows apis with different apis☆1,024Feb 21, 2021Updated 5 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,516Jul 8, 2025Updated 8 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,579Jan 5, 2021Updated 5 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- Portable Executable parsing library (from PE-bear)☆660Oct 4, 2025Updated 5 months ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Aug 6, 2025Updated 7 months ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,432Jul 20, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 7 years ago
- Also known by Microsoft as Knifecoat☆1,152Dec 22, 2022Updated 3 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆786Jun 23, 2022Updated 3 years ago
- A tool to elevate privilege with Windows Tokens☆1,063Oct 6, 2023Updated 2 years ago
- Open-Source Shellcode & PE Packer☆2,084Feb 3, 2024Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,637Feb 8, 2026Updated last month
- SharpSploit is a .NET post-exploitation library written in C#☆1,864Aug 12, 2021Updated 4 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Payload Generation Framework☆1,979Aug 21, 2024Updated last year
- Shellcode Compiler☆1,153Sep 1, 2024Updated last year
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆363Mar 4, 2026Updated 3 weeks ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago