joaovarelas / java-remote-class-loader
☆31Updated 2 years ago
Alternatives and similar repositories for java-remote-class-loader:
Users that are interested in java-remote-class-loader are comparing it to the libraries listed below
- Program to Inject a DLL into a process from memory.☆10Updated last year
- Change hash for a signed pe☆16Updated last year
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆33Updated 3 years ago
- ☆18Updated 2 years ago
- ☆52Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year
- Use CMSTP.exe to bypass UAC.☆42Updated 2 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆41Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆30Updated last year
- User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server…☆17Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- BYOVD collection☆23Updated last year
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- Adobe Reader DC Information Leak Exploit☆21Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆33Updated 3 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆18Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆44Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 10 months ago
- ☆39Updated 9 months ago
- Persistence via Shell Extensions☆64Updated last year
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Updated last year
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆33Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- Some Cyber Security related scripts☆18Updated last year
- Simple reverse shell to avoid Windows defender and kaspersky detection☆21Updated 3 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆26Updated last year
- Windows shellcode encoding and encrypting tool☆21Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated 10 months ago