shellcode execution using vanilla techniques
-
Updated
Mar 16, 2020 - Python
shellcode execution using vanilla techniques
CheatBox is currently only a DLL injector. The plan for this project is that CheatBox will become a tool like Cheat Engine with a QT interface. Also, some features like automatic game injections are planed.
A CLI DLL injector written in C++ for x86 and x64 architectures.
🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.
A ProcInjectionsFind volatility plugin runs against malware-infected memory images or memory of live VMs and examines each memory region of all running processes to conclude if it is the result of process injection.
Framework for Process Injection in Windows using Go
Privilege escalation using vulnerability on Microsoft teams by doing process injection and dll proxing Reverse shell, Password stealer, jupyter notebook, token sniffer, ransomware based on my encryption algorithm
Node.js bindings package 📦 for a process injector
PG ITSi: ProcessInjection
Process doppelganging c# implementation (NOT FINISHED)
Inject remote shellcode or DLL file into process memory using FileMapping
The "DLLHijack Injection" tool enables the injection of malicious DLLs into target processes, allowing for DLL hijacking attacks. This technique can be used to exploit vulnerable applications by replacing legitimate DLLs with malicious ones, potentially leading to unauthorized access, data manipulation, or system compromise.
Injection of codes @ViolentPython @Grayhatpython
Process injection techniques written in C++ based on MITRE ATT&CK techniques. This project was created for learning purposes.
Proof of concept, example of process hollowing, generating reverse TCP shellcode. Conducted on Windows 10 64 Bit 22H2.
Process injection framework in C#. It uses dynamic function loading using delegates and AES-encryption for strings and payloads
Code snippet to create a process using the "PROCESS_CREATION_MITIGATION_POLICY_BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON" flag
Works in any version from Windows 7 to 11. Injection of malicious code into legitimate Windows processes for evasion and simple malware to gain unauthorized access, using the Windows API. Serves as proof of concept or intrusion detection exercises.
Using Dll process injection to use the input on word document to be monitored on attackers console
adds itself as an exception to windows defender, moves itself to AppData and adds itself as a startup file.
Add a description, image, and links to the process-injection topic page so that developers can more easily learn about it.
To associate your repository with the process-injection topic, visit your repo's landing page and select "manage topics."