☆29Aug 24, 2025Updated 7 months ago
Alternatives and similar repositories for Hollowed-Process
Users that are interested in Hollowed-Process are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- d☆14Sep 5, 2025Updated 7 months ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- .lib file for linking against the NT CRT☆19Mar 18, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An example of PE hollowing injection technique☆26Jun 28, 2019Updated 6 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- ☆19Sep 17, 2025Updated 6 months ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Executing EXE Files From Memory☆11Nov 1, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- ☆23May 8, 2023Updated 2 years ago
- ☆24Feb 1, 2025Updated last year
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- ☆38Apr 7, 2023Updated 3 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- ☆17May 22, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- D☆44May 3, 2021Updated 4 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆16Jun 3, 2019Updated 6 years ago
- ☆25Apr 28, 2024Updated last year
- ☆26Sep 29, 2022Updated 3 years ago
- DarkRats Standalone HVNC☆26May 20, 2022Updated 3 years ago
- ☆73Mar 16, 2025Updated last year