Windows process injection methods
☆19Jul 18, 2021Updated 4 years ago
Alternatives and similar repositories for injection
Users that are interested in injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- A simple commandline injector using classic DLL injection☆160Apr 21, 2026Updated last month
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Win32 Differential Update Library☆14Dec 30, 2019Updated 6 years ago
- An implementation of the Process Hollowing technique.☆16Dec 13, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆52May 12, 2024Updated 2 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Async rust support for the reverse-engineered Crowdstrike Falcon protocol between the Sensor and cloud services☆19Mar 10, 2023Updated 3 years ago
- Repo for malware development practices I post on my blog☆36Oct 5, 2024Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago
- Microsoft C++ Headers and Libraries☆15Oct 15, 2020Updated 5 years ago
- The tool used to clone the digital signatures of legitimate programs☆60Oct 11, 2025Updated 7 months ago
- WebGL app that breaks out many of the threejs camera parameters to fine tune projection mapping alignment☆12Oct 7, 2017Updated 8 years ago
- Latest xorriso.exe 1.5.2 pre-build for Windows to make iso disk images to get CD to boot on EFI system☆19Mar 4, 2020Updated 6 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆15May 25, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆98Jun 24, 2021Updated 4 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆16Sep 21, 2019Updated 6 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆97Mar 8, 2023Updated 3 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- AhMyth is an popular open source android rat. But the official AhMyth contains many bugs. For an example, you can't fetch victim's files …☆28Jan 30, 2021Updated 5 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Conti Locker source code☆196Mar 2, 2022Updated 4 years ago
- Continuous Dictation Speech Recognition and Speech Synthesis in Win32☆18May 28, 2020Updated 5 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆41Jul 22, 2021Updated 4 years ago
- Output time spent in different GCC compilation phases for each comilation unit, by reading a build log file☆16May 5, 2021Updated 5 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- ☆24Feb 3, 2021Updated 5 years ago
- An implementation of the classic game "Breakout" written for the NES in 100% pure 6502 Assembly.☆20Aug 2, 2012Updated 13 years ago