Windows process injection methods
☆18Jul 18, 2021Updated 4 years ago
Alternatives and similar repositories for injection
Users that are interested in injection are comparing it to the libraries listed below
Sorting:
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆27Jan 21, 2025Updated last year
- An implementation of the Process Hollowing technique.☆16Dec 13, 2020Updated 5 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- AhMyth is an popular open source android rat. But the official AhMyth contains many bugs. For an example, you can't fetch victim's files …☆23Jan 30, 2021Updated 5 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- A simple commandline injector using classic DLL injection☆157Jun 24, 2022Updated 3 years ago
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆55Nov 17, 2025Updated 3 months ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆32Jan 21, 2022Updated 4 years ago
- Indirect NT syscalls LSASS dumper.☆46Jul 9, 2023Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43May 18, 2024Updated last year
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Jun 24, 2021Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆94Mar 8, 2023Updated 2 years ago
- Alphabets is a learning tool that helps kids develop cognitive and psychomotor skills such as writing, drawing, and recognition of alphab…☆11May 6, 2017Updated 8 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆13Dec 10, 2023Updated 2 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- ☆13Jun 29, 2023Updated 2 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago