A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging techniques to evade detection.
☆24Jun 8, 2024Updated last year
Alternatives and similar repositories for ShadowInjector
Users that are interested in ShadowInjector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆15Dec 12, 2023Updated 2 years ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- ☆26Nov 8, 2024Updated last year
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- Lap Timer for EdgeTX☆14Jan 3, 2024Updated 2 years ago
- ☆15Feb 12, 2023Updated 3 years ago
- ☆25Dec 3, 2024Updated last year
- dnskire: a tool for file infiltration over DNS☆19Dec 7, 2023Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.☆32May 4, 2025Updated 10 months ago
- Easily count site visitors with AWS Lambda and display it on your site.☆13Apr 15, 2025Updated 11 months ago
- ☆35Aug 13, 2023Updated 2 years ago
- Psiphon is an Internet censorship circumvention system.☆14Mar 11, 2024Updated 2 years ago
- ☆42Nov 13, 2025Updated 4 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 11 months ago
- High performance, distributed port scanner for mostly bugbounty. Fast by FastAPI.☆21May 2, 2024Updated last year
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- dontpopme bitches☆23Jun 16, 2022Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆24Jan 23, 2023Updated 3 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- ☆25Jul 11, 2022Updated 3 years ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- PHP WebShell Backdoor for Access all dir/file in the Website.☆14Jul 29, 2021Updated 4 years ago
- ☆21Jan 8, 2026Updated 2 months ago
- This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specifi…☆21Jul 9, 2024Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Updated this week
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- Collection of STL for FPV and drones☆42Feb 21, 2026Updated last month
- string encryption in Nim☆19Jun 15, 2024Updated last year