C# program that takes process id and path to DLL payload to perform DLL injection method.
☆55May 8, 2019Updated 6 years ago
Alternatives and similar repositories for DLL-Injection
Users that are interested in DLL-Injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Good python obfuscator☆11Aug 20, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆24Nov 29, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- ☆12Oct 9, 2020Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- ApertaCookie is a PowerShell module that can extract and decrypt cookie data from the SQLite databases of several popular browsers.☆13Apr 3, 2022Updated 3 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆57Sep 25, 2020Updated 5 years ago
- dem sharp donuts☆203Sep 11, 2022Updated 3 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- ☆10Jun 30, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Aug 23, 2021Updated 4 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Dirfuzz by golang☆15Feb 28, 2023Updated 3 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- Tool to walk SPF records for relevant domain names and Whois information.☆17May 30, 2019Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Collection of tested Cobaltstrike aggressor scripts.☆118Mar 16, 2020Updated 6 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Jun 11, 2019Updated 6 years ago
- Windows UAC bypass techniques implemented and written in Go☆216Mar 27, 2022Updated 4 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- Solana Dex Info for arbitrage bot☆18Sep 6, 2025Updated 6 months ago