Simple C implementation to perform shellcode process injection via win32 APIs
☆63Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for shellcode-process-injection
Users that are interested in shellcode-process-injection are comparing it to the libraries listed below
Sorting:
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)☆16Nov 11, 2019Updated 6 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- GUI版 EXP☆14Mar 20, 2019Updated 6 years ago
- BypassAV ShellCode Loader (Cobaltstrike/Metasploit)☆179Jul 27, 2019Updated 6 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Ladon Moudle MS17010 Exploit for PowerShell☆49Dec 7, 2019Updated 6 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- StenographyShellcodeLoader☆43Sep 8, 2020Updated 5 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Dec 5, 2020Updated 5 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated 11 months ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- 渗透测试复盘总结☆15Jul 16, 2020Updated 5 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆141Jun 25, 2020Updated 5 years ago
- ReflectiveDLL☆156Mar 16, 2020Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- sploit☆67Dec 21, 2019Updated 6 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- SharpRDP改编版☆20May 7, 2020Updated 5 years ago
- Source code RDPUploader☆19Dec 27, 2018Updated 7 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Apr 2, 2021Updated 4 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆244Aug 12, 2020Updated 5 years ago
- shellcode 异或加密并生成dll☆251Jul 6, 2020Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆108Jan 3, 2021Updated 5 years ago
- ☆23May 28, 2021Updated 4 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆111May 24, 2020Updated 5 years ago