s0i37 / shellcode_injectLinks
inject and run code into arbitrary process (x86 and x64)
☆14Updated 4 years ago
Alternatives and similar repositories for shellcode_inject
Users that are interested in shellcode_inject are comparing it to the libraries listed below
Sorting:
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Collection of shellcode injection and execution techniques☆18Updated 2 months ago
- Red Team C2 and Post Exploitation code☆36Updated 4 months ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆66Updated 5 years ago
- ☆14Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Updated 3 years ago
- Tool for pivoting over SMB pipes☆17Updated 6 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- Another AMSI bypass - but in C++.☆24Updated 2 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Updated 4 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated 2 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆91Updated 4 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- leaking net-ntlm with webdav☆26Updated 4 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆29Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Remove API hooks from a Beacon process.☆14Updated 4 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆22Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- Small POC for process ghosting☆40Updated 3 years ago