itaymigdal / awesome-injection
Centralized resource for listing and organizing known injection techniques and POCs
☆238Updated 3 months ago
Alternatives and similar repositories for awesome-injection:
Users that are interested in awesome-injection are comparing it to the libraries listed below
- ☆338Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆333Updated last week
- ☆248Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆357Updated 2 months ago
- ☆297Updated 3 months ago
- Native Syscalls Shellcode Injector☆264Updated last year
- Analyse your malware to surgically obfuscate it☆452Updated last month
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆269Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆374Updated 6 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆412Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆273Updated 8 months ago
- AV/EDR Lab environment setup references to help in Malware development☆364Updated this week
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆361Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆461Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆250Updated 8 months ago
- ☆271Updated last year
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆242Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆365Updated 4 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆180Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆628Updated 4 months ago
- Open Source C&C Specification☆232Updated this week
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆389Updated last year
- ☆212Updated this week
- Performing Indirect Clean Syscalls☆514Updated last year
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆306Updated 2 weeks ago
- Kill AV/EDR leveraging BYOVD attack☆339Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆306Updated last year
- Evasive Golang Loader☆131Updated 6 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆246Updated 10 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆176Updated 5 months ago