laomms / EXE2DLL_CLR
Add export function and convert exe to dll
☆25Updated 4 years ago
Alternatives and similar repositories for EXE2DLL_CLR:
Users that are interested in EXE2DLL_CLR are comparing it to the libraries listed below
- ☆36Updated 4 years ago
- ☆51Updated 5 years ago
- 非涉密源码☆19Updated last year
- ☆35Updated 4 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 9 years ago
- Load the evilDLL from socket connection without touch disk☆16Updated 3 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- 加密壳☆33Updated 5 years ago
- Kernel file/process/object tool☆66Updated 3 years ago
- Thanks to all those who helped me.☆20Updated 6 years ago
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- ☆10Updated 4 years ago
- ☆22Updated 4 years ago
- Process Hollowing Packer☆26Updated 7 years ago
- Play Doh Windows ACL Tools☆61Updated 2 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆12Updated 4 years ago
- This is a project to receive Base64 data and decode it in process☆15Updated 5 years ago
- Source code RDPUploader☆19Updated 6 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- ☆11Updated 3 years ago
- MS17-010 Tester☆13Updated 7 years ago
- Load PE via XML Attribute☆30Updated 5 years ago
- 具备对PE文件添加区段、添加花指令、对代码段加密、修复重定位、加密IAT等功能☆58Updated 5 years ago
- AppContainerBypass☆21Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago