yo-yo-yo-jbo / injection_and_hooking_introView external linksLinks
☆38Apr 7, 2023Updated 2 years ago
Alternatives and similar repositories for injection_and_hooking_intro
Users that are interested in injection_and_hooking_intro are comparing it to the libraries listed below
Sorting:
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated last month
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆91Dec 2, 2025Updated 2 months ago
- ☆47Feb 11, 2023Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Dec 9, 2025Updated 2 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 8 months ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Nov 7, 2022Updated 3 years ago
- ☆27May 1, 2023Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated 2 weeks ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 2 months ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Remote Command executor☆82Mar 11, 2023Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆305Aug 2, 2023Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- ☆29May 16, 2023Updated 2 years ago
- ☆30Aug 24, 2025Updated 5 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆55Dec 31, 2025Updated last month
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- Winsocket for Cobalt Strike.☆102Jul 6, 2023Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆134Mar 23, 2023Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Jan 26, 2024Updated 2 years ago
- ☆162Oct 25, 2023Updated 2 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Feb 26, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year