n3k / PyInjector
Python tool to inject DLLs into processes
☆10Updated 7 years ago
Alternatives and similar repositories for PyInjector:
Users that are interested in PyInjector are comparing it to the libraries listed below
- Zerokit server controller☆13Updated 5 years ago
- Debugger checks in 3 ways☆18Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- Zerokit shared code☆16Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- User-mode part of Zerokit platform☆20Updated 5 years ago
- Component Services Volatile Environment LPE☆11Updated 2 months ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- ☆10Updated 8 years ago
- a open source rat from china☆12Updated 8 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- Simple little rootkit made in C☆13Updated 3 years ago
- Frida Python Tool☆15Updated 4 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 2 months ago
- Windows DLL Loading Utility☆11Updated 4 years ago
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago
- Aurora Remote Administration Tool☆20Updated 6 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 7 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 6 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago