narhen / procjack
PoC of injecting code into a running Linux process
☆23Updated 5 years ago
Alternatives and similar repositories for procjack:
Users that are interested in procjack are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- ☆11Updated 5 years ago
- Reverse Windows shell over TLS☆18Updated 8 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- ☆11Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- Unamanged PS with Named Pipes☆9Updated 4 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- ☆28Updated 3 months ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆20Updated 5 years ago
- ☆24Updated 3 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Removal of certain event logs within a Windows OS☆7Updated 5 years ago
- ☆20Updated 3 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago