joaovarelas / java-remote-class-loaderLinks
☆32Updated 3 years ago
Alternatives and similar repositories for java-remote-class-loader
Users that are interested in java-remote-class-loader are comparing it to the libraries listed below
Sorting:
- Change hash for a signed pe☆16Updated 2 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Updated 4 years ago
- Program to Inject a DLL into a process from memory.☆13Updated last year
- Use CMSTP.exe to bypass UAC.☆52Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆74Updated last year
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- This script will not work with the latest version of chrome☆12Updated 7 months ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- ☆58Updated 2 years ago
- ☆39Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆67Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆81Updated 3 years ago
- ☆41Updated last year
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Read my blog for more info -☆32Updated 4 years ago
- ☆28Updated 2 years ago
- Linux Sleep Obfuscation☆106Updated last year
- Persistence via Shell Extensions☆63Updated 2 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆46Updated 3 years ago
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆34Updated 3 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆44Updated 2 years ago
- BYOVD collection☆24Updated last year
- AV/EDR killer using BYOVD technique☆43Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 3 years ago
- ☆39Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆33Updated 2 years ago
- C# API for Nidhogg rootkit☆20Updated last year