mgeeky / injectAllTheThings
Seven different DLL injection techniques in one single project.
☆10Updated 4 years ago
Alternatives and similar repositories for injectAllTheThings:
Users that are interested in injectAllTheThings are comparing it to the libraries listed below
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- A collection of my presentation materials.☆16Updated 9 months ago
- A console obfuscator for .NET assemblies.☆10Updated 2 years ago
- Remove API hooks from a Beacon process.☆13Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- ☆12Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆21Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year
- ☆26Updated 3 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆16Updated 3 weeks ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago
- Implementation of ITaskHandler in C++☆13Updated last year
- Experiment with d_olex's firmware and conducting "preboot" attack☆15Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated last year
- ☆18Updated 3 months ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- ☆15Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- ☆46Updated 3 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆11Updated 3 years ago
- Dangling COM Keys Finder☆15Updated 3 years ago
- ☆12Updated 3 weeks ago