laomms / EXE2DLL_CLRLinks
Add export function and convert exe to dll
☆26Updated 4 years ago
Alternatives and similar repositories for EXE2DLL_CLR
Users that are interested in EXE2DLL_CLR are comparing it to the libraries listed below
Sorting:
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- ☆37Updated 4 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆41Updated 4 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Updated 4 years ago
- This is a project to receive Base64 data and decode it in process☆15Updated 5 years ago
- Kernel file/process/object tool☆67Updated 3 years ago
- MS17-010 Tester☆13Updated 8 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Updated 5 years ago
- Process Hollowing Packer☆27Updated 7 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆55Updated 3 years ago
- AppContainerBypass☆21Updated 4 years ago
- Convert PE files to a shellcode☆78Updated 5 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆30Updated 3 years ago
- Windows CVE主防(HIPS/HIDS)☆55Updated 4 years ago
- Hide Port In Windows☆40Updated 8 months ago
- Thanks to all those who helped me.☆20Updated 7 years ago
- Kill Protected Process Light Process (include av)☆58Updated last year
- Load the evilDLL from socket connection without touch disk☆17Updated 3 years ago
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆43Updated 3 years ago
- ☆35Updated 4 years ago
- 具备对PE文件添加区段、添加花指令、对代码段加密、修复重定位、加密IAT等功能☆59Updated 5 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated 3 weeks ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago