sbousseaden / injection-1
Windows process injection methods
☆16Updated 5 years ago
Alternatives and similar repositories for injection-1
Users that are interested in injection-1 are comparing it to the libraries listed below
Sorting:
- APC DLL Injector with NtQueueApcThread and wake up thread support☆43Updated 7 years ago
- ☆31Updated 4 years ago
- ☆70Updated 3 months ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- ☆24Updated last year
- ☆36Updated 3 years ago
- Sysmon shenanigans☆65Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 2 years ago
- ☆15Updated 4 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 10 months ago
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- ☆62Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆40Updated 4 years ago
- A PoC tool for exploiting leaked process and thread handles☆31Updated last year
- ☆12Updated 4 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆77Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- ☆28Updated 3 years ago
- ☆24Updated 3 years ago
- ☆25Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 3 years ago