Python toolkit for injecting DLL files into running processes on Windows
☆253Mar 19, 2017Updated 9 years ago
Alternatives and similar repositories for python-dll-injection
Users that are interested in python-dll-injection are comparing it to the libraries listed below
Sorting:
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Some exploits and exploit development stuff.☆153Feb 19, 2022Updated 4 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- Cknife☆28Feb 2, 2018Updated 8 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- dll injection tool that implements various methods☆500Jan 7, 2013Updated 13 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆276Aug 10, 2015Updated 10 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- peinjector - MITM PE file infector☆611May 11, 2016Updated 9 years ago
- Collection of scripts that were once useful for reverse engineering things☆75May 8, 2010Updated 15 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Jun 26, 2017Updated 8 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Python PTY backdoors - full PTY or nothing!☆754Jul 28, 2014Updated 11 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Mar 5, 2014Updated 12 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆792Sep 30, 2020Updated 5 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Mar 15, 2015Updated 11 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆34Sep 29, 2012Updated 13 years ago
- Linux Runtime Process Injection Tool☆61Feb 21, 2013Updated 13 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago