joaovarelas / java-remote-class-loaderLinks
☆31Updated 3 years ago
Alternatives and similar repositories for java-remote-class-loader
Users that are interested in java-remote-class-loader are comparing it to the libraries listed below
Sorting:
- Change hash for a signed pe☆16Updated 2 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆36Updated 2 years ago
- Use CMSTP.exe to bypass UAC.☆50Updated 3 years ago
- Program to Inject a DLL into a process from memory.☆12Updated last year
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- This script will work with the latest version of chrome☆13Updated 5 months ago
- ☆40Updated last year
- ☆56Updated 2 years ago
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- shellcode-loaders and beacon-loaders☆70Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆64Updated 2 years ago
- Akame is an open-source, shellcode loader written in C++17☆20Updated 6 months ago
- ☆57Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Persistence via Shell Extensions☆62Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆71Updated last year
- ☆50Updated 3 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆24Updated last year
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆46Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- C# API for Nidhogg rootkit☆19Updated last year
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Linux Sleep Obfuscation☆106Updated last year
- In-memory hiding technique☆56Updated 9 months ago