Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellcode will be executed, then return control flow to the original entry point of the program. Perhaps a nice way to maintain persistence? Check out the README for full details.
☆22Oct 29, 2012Updated 13 years ago
Alternatives and similar repositories for PE-Injector
Users that are interested in PE-Injector are comparing it to the libraries listed below
Sorting:
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Jan 17, 2016Updated 10 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- MD5 algorithm implementation - x86 assembler☆25Mar 15, 2015Updated 10 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- This tool is a plugin based version checker for .NET obfuscators.☆12Jun 13, 2016Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆17Jul 20, 2017Updated 8 years ago
- ☆19Jun 29, 2012Updated 13 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- Materials for OWASP presentation on malicious JavaScript☆16Aug 30, 2010Updated 15 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Remote Windows shell☆32Jun 22, 2014Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Jul 6, 2014Updated 11 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago