superswan / memloader_inj-winLinks
Inject remote shellcode or DLL file into process memory using FileMapping
☆14Updated 2 years ago
Alternatives and similar repositories for memloader_inj-win
Users that are interested in memloader_inj-win are comparing it to the libraries listed below
Sorting:
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 3 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆22Updated 3 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Updated 4 years ago
- A very weird RAT☆19Updated 3 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆26Updated 3 years ago
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- Reverse Socks5 proxy for windows☆14Updated 2 years ago
- Hide Port In Windows☆40Updated 9 months ago
- A simple program to obfuscate code written in cpp.☆50Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- 关闭恶意驱动的文件和注册表保护☆13Updated 3 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Updated last year
- A gadget for converting PE files to shellcode.☆12Updated 5 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆69Updated last year
- ☆32Updated 2 years ago
- A collection of cpuid instruction implementations for anti-vm purposes.☆9Updated last year
- Windows API Call Obfuscation☆109Updated 2 years ago
- Windows PE Signature Thief in C++☆50Updated 4 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆36Updated 6 years ago
- Kill Protected Process Light Process (include av)☆58Updated last year
- Botnet system from deep-web Russians forums. Tiny Nuke!☆92Updated 8 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Convert PE files to a shellcode☆79Updated 5 years ago
- Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.☆31Updated 3 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆42Updated 4 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated 10 months ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated 2 years ago
- Record & prevent file deletion in kernel mode☆44Updated 5 years ago