n3k / PyInjector
Python tool to inject DLLs into processes
☆10Updated 7 years ago
Alternatives and similar repositories for PyInjector:
Users that are interested in PyInjector are comparing it to the libraries listed below
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- Zerokit server controller☆13Updated 5 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Exploit development library for python users☆11Updated 2 years ago
- Aurora Remote Administration Tool☆20Updated 6 years ago
- ☆9Updated 7 years ago
- Prototype for an in memory fuzzer☆13Updated 7 years ago
- Debugger checks in 3 ways☆18Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- SkyRAT - Powershell Remote Administration Tool☆31Updated 7 years ago
- TaskMgr Volatile Environment LPE☆13Updated 3 months ago
- ☆18Updated 9 years ago
- Tunnel IP through DNS for fun and profit (aka stealing hotel wifi)☆7Updated 7 months ago
- does reflective dll injection☆8Updated 11 years ago
- Zerokit shared code☆16Updated 5 years ago
- A collection of anti disassembly techniques☆18Updated 7 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆11Updated last year
- Component Services Volatile Environment LPE☆11Updated 3 months ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆14Updated 7 years ago
- Old and probably outdated IDA plugins☆24Updated 8 years ago
- A Unix rootkit☆16Updated 4 years ago