dll proxying
☆60Mar 3, 2021Updated 5 years ago
Alternatives and similar repositories for dll-hijacking
Users that are interested in dll-hijacking are comparing it to the libraries listed below
Sorting:
- LOLBINs that inject a DLL into a given process ID.☆139Nov 21, 2021Updated 4 years ago
- ☆74Jul 23, 2021Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Linux C2 框架demo,为期2周的”黑客编程马拉松“,从学习编程语言开始到实现一个demo的产物☆223Dec 8, 2022Updated 3 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- A SigFlip implement in golang☆51Jan 5, 2022Updated 4 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Mar 19, 2018Updated 7 years ago
- 创建服务持久化☆108Apr 26, 2021Updated 4 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Jun 11, 2019Updated 6 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- Hijack Printconfig.dll to execute shellcode☆100Jan 15, 2021Updated 5 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Sep 16, 2020Updated 5 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- Go wrapper for in-memory DLL module loader, MemoryModule☆32Feb 13, 2018Updated 8 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆334Oct 9, 2021Updated 4 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- 在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PR☆15Oct 15, 2021Updated 4 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆132Sep 12, 2021Updated 4 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Jun 17, 2020Updated 5 years ago
- In line function hooking LKM rootkit☆52Mar 5, 2020Updated 6 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Windows 反射式注入DLL☆35Dec 8, 2018Updated 7 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆20Dec 11, 2020Updated 5 years ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Mar 13, 2020Updated 5 years ago