rsmusllp / syringeLinks
A General Purpose DLL & Code Injection Utility
☆157Updated 8 years ago
Alternatives and similar repositories for syringe
Users that are interested in syringe are comparing it to the libraries listed below
Sorting:
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 5 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Updated 9 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆155Updated 2 years ago
- some pocs for antivirus evasion☆131Updated 2 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- Elevation by environment variable expansion☆64Updated 9 years ago
- A tool to detect and crash Cuckoo Sandbox☆296Updated last year
- Ruxcon2016 POC Code☆141Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Updated 7 years ago
- Teaching old shellcode new tricks☆208Updated 8 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Updated 10 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge☆164Updated 7 years ago
- DLL Injection tool to unlock guest VMs☆239Updated 13 years ago
- Passive UAC elevation using dll infection☆76Updated 11 years ago
- A "tiny" meterpreter stager☆127Updated 6 years ago
- Platform independent peCloak fork based on Capstone☆107Updated 9 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Updated 8 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Updated 6 years ago
- An attempt at Process Doppelgänging☆183Updated 8 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 9 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆94Updated 4 months ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆365Updated 11 years ago
- Reflective Polymorphism☆109Updated 7 years ago
- Fileless Ransomware Example☆38Updated 8 years ago
- ☆220Updated 7 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆147Updated 10 years ago
- A C/C++ implementation of Microsoft's Antimalware Scan Interface☆183Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆133Updated 4 years ago