tothi / dll-hijack-by-proxyingLinks
Exploiting DLL Hijacking by DLL Proxying Super Easily
☆512Updated last year
Alternatives and similar repositories for dll-hijack-by-proxying
Users that are interested in dll-hijack-by-proxying are comparing it to the libraries listed below
Sorting:
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆805Updated 4 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆660Updated last year
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆566Updated 2 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,126Updated 2 years ago
- Original C Implementation of the Hell's Gate VX Technique☆1,054Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,000Updated 4 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆898Updated 4 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆946Updated 2 years ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆675Updated last year
- A small x64 library to load dll's into memory.☆441Updated last year
- PE loader with various shellcode injection techniques☆411Updated 2 years ago
- Yet another variant of Process Hollowing☆397Updated 4 months ago
- Sleep Obfuscation☆760Updated last year
- Inline syscalls made easy for windows on clang☆706Updated 11 months ago
- Signtool for expired certificates☆477Updated last year
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,222Updated last week
- Win32 and Kernel abusing techniques for pentesters☆954Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆239Updated last year
- 🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engine…☆343Updated 7 months ago
- Dynamic unpacker based on PE-sieve☆732Updated last week
- Controlling Windows PP(L)s☆329Updated last year
- x64 Dynamic Reverse Engineering Toolkit☆659Updated 2 years ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,156Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,044Updated last year
- PoCs and tools for investigation of Windows process execution techniques☆916Updated 2 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆750Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆779Updated 10 months ago
- A Highly capable Pe Packer☆702Updated 2 years ago
- Shoggoth: Asmjit Based Polymorphic Encryptor☆731Updated last year
- A way to delete a locked file, or current running executable, on disk.☆535Updated 10 months ago