josh0xA / threadfire
PoC Thread Execution Hijacking for Win32 Code Injection
☆176Updated 8 months ago
Alternatives and similar repositories for threadfire:
Users that are interested in threadfire are comparing it to the libraries listed below
- Research on Anti-malware and other related security solutions☆258Updated 4 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 5 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆95Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆76Updated 2 years ago
- Demos of various (also non standard) persistence methods used by malware☆221Updated 2 years ago
- ☆134Updated last month
- A kernel rootkit with remote command and control interface for windows☆108Updated 7 years ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 5 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆157Updated 5 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆214Updated 2 years ago
- Universal Unhooking☆321Updated 6 years ago
- Persisting in the Windows registry "invisibly"☆340Updated 6 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆132Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆245Updated 4 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆329Updated 4 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆193Updated 4 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 4 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆94Updated 3 years ago
- Personal research and publication on malware families☆137Updated 3 months ago
- Managed assembly shellcode generation☆268Updated 4 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆102Updated 4 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- Inject code into a legitimate process☆143Updated 10 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆235Updated 4 years ago
- Live hunting of code injection techniques☆380Updated 5 years ago
- A C/C++ implementation of Microsoft's Antimalware Scan Interface☆178Updated 7 years ago
- A more stealthy variant of "DLL hollowing"☆345Updated last year