theflakes / Evil_DLLLinks
Simple DLL to test various injection methods.
☆52Updated 5 years ago
Alternatives and similar repositories for Evil_DLL
Users that are interested in Evil_DLL are comparing it to the libraries listed below
Sorting:
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- MiniDump a process in memory with rust☆37Updated 4 years ago
- Experiments on the Windows Internals☆31Updated 6 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Updated 5 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated last year
- Initial Commit of Coresploit☆57Updated 4 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Updated 6 years ago
- ☆19Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- ☆52Updated 6 years ago
- Some simple process injection techniques targeting the Windows platform☆31Updated 6 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- ☆48Updated 5 years ago
- Apply YARA rules to your Cutter projects.☆16Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- AMSI detection PoC☆31Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated 2 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago