joaovarelas / java-remote-class-loaderLinks
☆32Updated 2 years ago
Alternatives and similar repositories for java-remote-class-loader
Users that are interested in java-remote-class-loader are comparing it to the libraries listed below
Sorting:
- Program to Inject a DLL into a process from memory.☆11Updated last year
- Change hash for a signed pe☆16Updated 2 years ago
- This script will work with the latest version of chrome☆11Updated 2 months ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆42Updated 2 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆61Updated last year
- Use CMSTP.exe to bypass UAC.☆43Updated 3 years ago
- Adobe Reader DC Information Leak Exploit☆21Updated 2 years ago
- ☆19Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- ☆54Updated 2 years ago
- Persistence via Shell Extensions☆62Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Ntdll Unhooking☆13Updated 2 months ago
- golang String Obfuscate☆9Updated 3 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆32Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆27Updated last month
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- Akame is an open-source, shellcode loader written in C++17☆20Updated 3 months ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆20Updated 2 months ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆36Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆33Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- AV engines evasion for C++ simple malware part 1 source code☆13Updated 2 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 2 months ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 3 years ago
- BYOVD collection☆23Updated last year