A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging techniques to evade detection.
☆24Jun 8, 2024Updated last year
Alternatives and similar repositories for ShadowInjector
Users that are interested in ShadowInjector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆15Dec 12, 2023Updated 2 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- Misery Loader to bypass modern EDR solutions☆19Dec 20, 2024Updated last year
- ☆48Feb 11, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- Password list generator in node js☆10May 8, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- ☆26Nov 8, 2024Updated last year
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- Lap Timer for EdgeTX☆14Jan 3, 2024Updated 2 years ago
- ☆15Feb 12, 2023Updated 3 years ago
- ☆10Mar 27, 2022Updated 4 years ago
- dnskire: a tool for file infiltration over DNS☆20Dec 7, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.☆34May 4, 2025Updated 11 months ago
- ☆35Aug 13, 2023Updated 2 years ago
- ☆43Nov 13, 2025Updated 5 months ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated last year
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- dontpopme bitches☆23Jun 16, 2022Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆24Jan 23, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 10 months ago
- High performance, distributed port scanner for mostly bugbounty. Fast by FastAPI.☆20May 2, 2024Updated 2 years ago
- YesMan☆19Nov 8, 2023Updated 2 years ago
- This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specifi…☆21Jul 9, 2024Updated last year
- ☆20Jan 8, 2026Updated 3 months ago
- ☆13Nov 29, 2024Updated last year
- A powerful URL parameter and request fuzzing tool that processes URLs or Burp Suite raw requests, replacing values with custom payloads w…☆19Apr 12, 2026Updated 3 weeks ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- string encryption in Nim☆19Jun 15, 2024Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆21Mar 27, 2024Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆43Mar 17, 2026Updated last month
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 7 years ago
- Independant repo to my fork of exploitdb☆25Sep 22, 2020Updated 5 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago