mgeeky / injectAllTheThings
Seven different DLL injection techniques in one single project.
☆11Updated 4 years ago
Alternatives and similar repositories for injectAllTheThings:
Users that are interested in injectAllTheThings are comparing it to the libraries listed below
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Remove API hooks from a Beacon process.☆14Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- ☆15Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆26Updated 2 months ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- Another Portable Executable files analysing stuff☆21Updated 13 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- ☆18Updated 7 months ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- ☆12Updated last year
- ☆48Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated last year