The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single output executable. This output executable will contain both the malicious and legitimate executables.
☆43Jun 30, 2024Updated last year
Alternatives and similar repositories for Inject-EXE
Users that are interested in Inject-EXE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Jul 18, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- ☆26Dec 15, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆31Aug 9, 2024Updated last year
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆23Jun 30, 2024Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- OSINT automation for hackers.☆23Jun 27, 2023Updated 2 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- ☆14Mar 28, 2024Updated 2 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated last month
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- XSS-Checker is a tool used to Check / Validate for XSS vulnerabilities☆18Dec 1, 2022Updated 3 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆31May 7, 2024Updated last year
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 11 months ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆18Dec 2, 2023Updated 2 years ago
- WiFi QRCode Generator for LOLIN D32 Pro (Board based ESP32)☆15Feb 15, 2019Updated 7 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year