Minimal DLL-injection tool.
☆37Apr 5, 2016Updated 9 years ago
Alternatives and similar repositories for inject
Users that are interested in inject are comparing it to the libraries listed below
Sorting:
- A collection of insightful projects for Windows.☆19Sep 30, 2016Updated 9 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Jan 15, 2014Updated 12 years ago
- ☆22Aug 16, 2025Updated 6 months ago
- 二进制学习笔记☆12Oct 14, 2020Updated 5 years ago
- Библиотека шифрования XTEA3 на С++☆14Jul 6, 2019Updated 6 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- 群晖使用钉钉机器人做消息通知☆10Jun 9, 2020Updated 5 years ago
- Injection-based modification for Diablo 1☆12Nov 20, 2015Updated 10 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- Allows installing or booting Operating Systems via PXE over the Network. We hopefully can implement RBCP (Intels Remote Boot Configuratio…☆15Jul 23, 2025Updated 7 months ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- AI-Powered Reverse Engineering Plugin for IDA Pro☆45Updated this week
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- 《面向脚本驱动的软件开发》示例代码☆18Jan 12, 2019Updated 7 years ago
- DLL and API hooking example to hide running in a Terminal Session☆21Jun 5, 2020Updated 5 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- PDB Explorer 是一个能够查看微软 pdb 文件(Program DataBase,程序数据库)的工具,它能够将 pdb 文件中的 struct、union 及 enum 类型的定义以 C/C++ 的语法显示出来,特别适合 Windows 底层研究人员及 DDK …☆38Jun 2, 2015Updated 10 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- Microsoft Redistributable Download & Installer☆18Oct 14, 2019Updated 6 years ago
- ☆68Oct 17, 2022Updated 3 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- the puppy proxy☆22May 19, 2020Updated 5 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago