A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging techniques to evade detection.
☆24Jun 8, 2024Updated last year
Alternatives and similar repositories for ShadowInjector
Users that are interested in ShadowInjector are comparing it to the libraries listed below
Sorting:
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆15Dec 12, 2023Updated 2 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- ☆25Dec 3, 2024Updated last year
- ☆26Nov 8, 2024Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆24Jan 23, 2023Updated 3 years ago
- AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.☆32May 4, 2025Updated 9 months ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- ☆42Nov 13, 2025Updated 3 months ago
- A web application that offers end-to-end encrypted file and message transfer using Blazor WASM, Geralt and BlazorSodium (libsodium langua…☆45Dec 1, 2025Updated 3 months ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated last week
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 10 months ago
- ☆47Feb 11, 2023Updated 3 years ago
- This project equips Claude Code with advanced binary analysis capabilities for tasks such as incident response, malware investigation, a…☆32Nov 19, 2025Updated 3 months ago
- ☆10Mar 27, 2022Updated 3 years ago
- Password list generator in node js☆10May 8, 2024Updated last year
- ☆12Dec 3, 2022Updated 3 years ago
- ☆12Aug 25, 2023Updated 2 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- 🔎 Hunt down social media accounts by username across social networks☆10Jan 24, 2023Updated 3 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- ☆12Feb 8, 2021Updated 5 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- ☆16Jun 21, 2024Updated last year
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- All combinations of various characters, to get the desired word☆20Dec 13, 2023Updated 2 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- ☆14Jul 18, 2019Updated 6 years ago
- Psiphon is an Internet censorship circumvention system.☆14Mar 11, 2024Updated last year
- Use apcupsd as a network UPS monitor for Synology NAS.☆15Mar 5, 2025Updated 11 months ago
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated 10 months ago
- ☆52Oct 29, 2024Updated last year
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year