joaovarelas / java-remote-class-loader
☆31Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for java-remote-class-loader
- Program to Inject a DLL into a process from memory.☆10Updated 8 months ago
- Change hash for a signed pe☆15Updated last year
- Vulnerability analysis and proof of concepts☆32Updated last year
- Use CMSTP.exe to bypass UAC.☆39Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆41Updated 3 years ago
- Read my blog for more info -☆32Updated 3 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆41Updated 2 years ago
- Adobe Reader DC Information Leak Exploit☆22Updated 2 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 2 years ago
- ☆48Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆28Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆30Updated 5 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆27Updated 3 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 6 months ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆39Updated 11 months ago
- Convert native dll to shellcode, and support exported function☆22Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated last year
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆32Updated 2 years ago
- ☆18Updated 2 years ago
- Persistence via Shell Extensions☆63Updated last year
- ☆27Updated 2 years ago
- ☆26Updated 2 years ago
- ☆37Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated 11 months ago
- Small POC for process ghosting☆38Updated 2 years ago
- using the gpu to hide your payload☆47Updated 2 years ago