whokilleddb / injection-for-dummiesLinks
A collection of PoCs for different injection techniques on Windows!
☆43Updated last year
Alternatives and similar repositories for injection-for-dummies
Users that are interested in injection-for-dummies are comparing it to the libraries listed below
Sorting:
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Situational Awareness script to identify how and where to run implants☆50Updated 6 months ago
- ☆56Updated 6 months ago
- IAT Unhooking proof-of-concept☆29Updated last year
- Cobalt Strike BOFS☆16Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- ☆38Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆27Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 9 months ago
- ☆44Updated 11 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 8 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆52Updated last year
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- Cortex EDR Ransomware protection Bypass☆24Updated 3 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆55Updated 7 months ago
- A pure C version of SymProcAddress☆26Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 2 months ago
- ☆36Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- ☆27Updated 2 years ago