This tool allows you to stealthily inject a DLL into a process.
☆14Jul 11, 2015Updated 10 years ago
Alternatives and similar repositories for StealthInject
Users that are interested in StealthInject are comparing it to the libraries listed below
Sorting:
- ☆15Jun 12, 2015Updated 10 years ago
- Hides a DLL and associated files based on a FILE_TAG as a user-mode injected DLL.☆21Oct 28, 2013Updated 12 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Using Deviare to Cheat on Games: Intercepting Direct3D COM objects and making walls invisible☆13Jul 1, 2013Updated 12 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- A library to install/uninstall NDIS driver on Windows☆15Jul 15, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- x86_x64 emulator☆16Jun 23, 2015Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- LANGZI_SRC_安全巡航 是一款集成漏扫,验证,资产监控,自动复现并且生成结果表报的工具,实现初衷是为了帮助白帽子在SRC中节约时间成本的自动化工具。☆14Jul 7, 2019Updated 6 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- 解析静态库(Lib)文件,提取出所有函数信息,组织成自定义格式文件☆38Jul 21, 2013Updated 12 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A Windows driver used to facilitate DLL injection☆27Oct 29, 2017Updated 8 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- enhanced spy++☆10Feb 7, 2014Updated 12 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- ☆10Jul 13, 2015Updated 10 years ago