joaovarelas / java-remote-class-loaderLinks
☆32Updated 3 years ago
Alternatives and similar repositories for java-remote-class-loader
Users that are interested in java-remote-class-loader are comparing it to the libraries listed below
Sorting:
- Change hash for a signed pe☆16Updated 2 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- Program to Inject a DLL into a process from memory.☆11Updated last year
- Use CMSTP.exe to bypass UAC.☆47Updated 3 years ago
- This script will work with the latest version of chrome☆13Updated 3 months ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- Linux Sleep Obfuscation☆105Updated last year
- ☆54Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆70Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆11Updated 4 months ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆44Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Read Memory without ReadProcessMemory for Current Process☆88Updated 3 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆35Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆71Updated 3 years ago
- Persistence via Shell Extensions☆62Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- C# API for Nidhogg rootkit☆19Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆23Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆22Updated 3 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆106Updated last year