Run-time loader and patcher
☆15Sep 22, 2018Updated 7 years ago
Alternatives and similar repositories for patchya
Users that are interested in patchya are comparing it to the libraries listed below
Sorting:
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Dec 19, 2021Updated 4 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Simple tool that allows add custom function (with custom dll) to PE-file import section☆11Apr 23, 2019Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 9 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Modular binary injection framework☆18Jan 6, 2020Updated 6 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Mar 31, 2016Updated 9 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆22Jan 28, 2021Updated 5 years ago
- The source code of https://rshell.dev☆23May 31, 2021Updated 4 years ago
- Convert PE files to a shellcode☆81May 7, 2020Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆40Jul 29, 2025Updated 6 months ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Themida 3.x research☆42Feb 28, 2025Updated 11 months ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago