A simple tool for merging DLLs into executables with PEB-invisible mapping.
☆290Jan 9, 2025Updated last year
Alternatives and similar repositories for dll-merger
Users that are interested in dll-merger are comparing it to the libraries listed below
Sorting:
- A simple password-based PE encryptor for Windows 32-bit executables.☆51Jan 9, 2025Updated last year
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,255Aug 27, 2023Updated 2 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Nov 4, 2021Updated 4 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- 过去写的一些Windows安全 研究相关代码☆135Feb 2, 2019Updated 7 years ago
- Yet another variant of Process Hollowing☆460Jul 31, 2025Updated 7 months ago
- LoadLibrary for offensive operations☆1,176Oct 22, 2021Updated 4 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- A tool/library to proxify DLL☆38Apr 10, 2022Updated 3 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 3 years ago
- x86 Binary Code Virtualization Tool☆224Feb 7, 2025Updated last year
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆337Jan 16, 2022Updated 4 years ago
- PoC MSVC COFF Object file loader/injector.☆184Mar 19, 2021Updated 4 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- Stop Windows Defender programmatically☆993Nov 4, 2022Updated 3 years ago
- Fast Conversion Windows Dynamic Link Library To ShellCode☆420Mar 10, 2022Updated 3 years ago
- A simple COM server which provides a component to run shellcode☆148May 12, 2020Updated 5 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- Inject .NET assemblies into an existing process☆507Jan 19, 2022Updated 4 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆989Dec 4, 2022Updated 3 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,335Updated this week
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆144May 10, 2022Updated 3 years ago
- Kernel shellcode injector☆148Mar 23, 2021Updated 4 years ago
- ☆12Aug 2, 2017Updated 8 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- AV/EDR evasion via direct system calls.☆1,795Sep 3, 2022Updated 3 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated 2 years ago
- PoC capable of detecting manual syscalls from usermode.☆206Nov 13, 2025Updated 3 months ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆151Nov 21, 2021Updated 4 years ago
- A quick-and-dirty anti-hook library proof of concept.☆105Aug 29, 2018Updated 7 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆689Jun 28, 2022Updated 3 years ago