josh0xA / threadfire
PoC Thread Execution Hijacking for Win32 Code Injection
☆176Updated 6 months ago
Alternatives and similar repositories for threadfire:
Users that are interested in threadfire are comparing it to the libraries listed below
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 5 years ago
- ☆131Updated last year
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆75Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Demos of various (also non standard) persistence methods used by malware☆219Updated last year
- Universal Unhooking☆318Updated 6 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆91Updated 2 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆147Updated last year
- Personal research and publication on malware families☆137Updated last month
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆243Updated 4 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆132Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆344Updated 4 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆103Updated 4 years ago
- A kernel rootkit with remote command and control interface for windows☆108Updated 7 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆93Updated 3 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆216Updated 2 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆326Updated 4 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- DLL Generator for side loading attack☆170Updated 6 years ago
- Live hunting of code injection techniques☆380Updated 5 years ago
- Managed assembly shellcode generation☆266Updated 3 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Persisting in the Windows registry "invisibly"☆340Updated 6 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆156Updated 5 years ago
- Just another Windows Process Injection☆390Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago