infodox / python-dll-injectionLinks
Python toolkit for injecting DLL files into running processes on Windows
☆254Updated 8 years ago
Alternatives and similar repositories for python-dll-injection
Users that are interested in python-dll-injection are comparing it to the libraries listed below
Sorting:
- A Reverse Engineering Tool for py2exe applications.☆210Updated 8 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Updated 3 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆327Updated 8 years ago
- port of mimipenguin.sh in python with some additional protection features☆216Updated 8 years ago
- ☆166Updated 8 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆266Updated 8 years ago
- Runtime Process Manipulation☆240Updated last year
- A tool to detect and crash Cuckoo Sandbox☆297Updated last year
- Simple runtime crypter in C/C++.☆168Updated 10 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 5 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆147Updated 10 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Updated 7 years ago
- dll injection tool that implements various methods☆500Updated 13 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Updated 8 years ago
- ☆228Updated 9 years ago
- pyREtic is an extensible framework for in-memory Python 2.x bytecode reverse engineering☆268Updated 2 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆463Updated 7 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆156Updated 2 years ago
- A General Purpose DLL & Code Injection Utility☆157Updated 8 years ago
- A basic Windows DLL injector in C using CreateRemoteThread and LoadLibrary. Implemented for educational purposes.☆131Updated 8 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆208Updated 12 years ago
- ZeroAccess v3 toolkit☆166Updated 8 years ago
- An attempt at Process Doppelgänging☆183Updated 8 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆505Updated 8 years ago
- ☆519Updated 7 years ago
- Post-exploitation tool for hiding processes from monitoring applications☆746Updated 2 years ago
- Search for code cave in all binaries☆284Updated 3 months ago
- Extract .pyc files from executables created with py2exe☆286Updated 2 years ago
- Teaching old shellcode new tricks☆209Updated 8 years ago
- Various snippets created during malware analysis☆464Updated 4 months ago