☆208Apr 5, 2022Updated 3 years ago
Alternatives and similar repositories for com_inject
Users that are interested in com_inject are comparing it to the libraries listed below
Sorting:
- ☆170Jan 7, 2022Updated 4 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆64Jan 17, 2023Updated 3 years ago
- Sleep Obfuscation☆816Dec 3, 2023Updated 2 years ago
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆144May 10, 2022Updated 3 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆299Apr 10, 2021Updated 4 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆917Jul 20, 2024Updated last year
- Overwrite a process's recovery callback and execute with WER☆102Apr 17, 2022Updated 3 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆501Jan 25, 2022Updated 4 years ago
- Threadless Process Injection through entry point hijacking☆350Sep 10, 2024Updated last year
- ☆153Jan 6, 2023Updated 3 years ago
- ☆153Jul 31, 2022Updated 3 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Jul 31, 2019Updated 6 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆202Jun 6, 2024Updated last year
- UAC bypass by abusing RPC and debug objects.☆627Oct 19, 2023Updated 2 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆554Dec 3, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Sep 13, 2022Updated 3 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆374May 24, 2022Updated 3 years ago
- ☆615Jul 21, 2025Updated 7 months ago
- PoC MSVC COFF Object file loader/injector.☆185Mar 19, 2021Updated 4 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- Yet another variant of Process Hollowing☆458Jul 31, 2025Updated 7 months ago
- ☆777Oct 17, 2023Updated 2 years ago
- ☆61Feb 10, 2022Updated 4 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆135Dec 20, 2022Updated 3 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- An implementation and proof-of-concept of Process Forking.☆230Nov 29, 2021Updated 4 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆553Apr 8, 2025Updated 10 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- A simple COM server which provides a component to run shellcode☆149May 12, 2020Updated 5 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆533Jul 2, 2025Updated 7 months ago
- Bypassing UAC with SSPI Datagram Contexts☆461Sep 24, 2023Updated 2 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆235Oct 18, 2022Updated 3 years ago
- ☆564Feb 22, 2024Updated 2 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆498Feb 3, 2022Updated 4 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Dec 26, 2021Updated 4 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆285Jun 18, 2025Updated 8 months ago