The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single output executable. This output executable will contain both the malicious and legitimate executables.
☆45Jun 30, 2024Updated last year
Alternatives and similar repositories for Inject-EXE
Users that are interested in Inject-EXE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆31Jul 17, 2024Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆63Jul 18, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- ☆26Dec 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆31Aug 9, 2024Updated last year
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- OSINT automation for hackers.☆23Jun 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆14Mar 28, 2024Updated 2 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated last month
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆32May 7, 2024Updated last year
- Script to decrypt / import chromium (edge/chrome) cookies☆15Aug 1, 2023Updated 2 years ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆36Feb 27, 2025Updated last year
- Designed to demonstrate how hackers can obtain detailed information about target devices through a simple link, Get-INFO serves as both a…☆32Aug 3, 2025Updated 8 months ago
- ☆19Dec 2, 2023Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 3 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- ☆17Oct 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- All Apple Scama For phishing☆15Dec 22, 2017Updated 8 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ru…☆18Jan 15, 2019Updated 7 years ago
- GUI app for Windows to hide Mouse Pointer.☆14Mar 26, 2024Updated 2 years ago
- Red Teaming Tactics and Techniques☆12Feb 10, 2022Updated 4 years ago
- A thief of discord accounts and Bitcoin wallets (Captures other logins from sites including steam, paypal, sellix and several other sites…☆11Jul 20, 2023Updated 2 years ago