Mockingjay Process Injection Vulnerable DLL Finder
☆19Jun 30, 2023Updated 2 years ago
Alternatives and similar repositories for Mockingjay---Vulnerable-DLL-Finder
Users that are interested in Mockingjay---Vulnerable-DLL-Finder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mockingjay process self injection POC☆50Aug 8, 2023Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- ☆29Aug 24, 2025Updated 6 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Feb 14, 2022Updated 4 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated last year
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- Collection of scripts and CMake files to easily link to LLVM into your project (Windows, Linux, macOS).☆43Apr 2, 2025Updated 11 months ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- Example of making debugger using Hardware Breakpoint + VEH☆18May 13, 2021Updated 4 years ago
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆38May 12, 2022Updated 3 years ago
- ☆18Oct 8, 2024Updated last year
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆140May 22, 2025Updated 10 months ago
- Bento - Rust Container Runtime☆23Feb 23, 2026Updated last month
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 11 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- API Hammering with C++20☆51Jul 21, 2022Updated 3 years ago
- A method to Disable DSE using .data ptr hooks☆40Feb 1, 2024Updated 2 years ago
- ☆21Mar 12, 2026Updated last week
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆40Dec 12, 2025Updated 3 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago