The BEST DLL Injector Library.
-
Updated
May 6, 2024 - C++
The BEST DLL Injector Library.
Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace
Shellcode injection technique. Given as C++ header, standalone Rust program or library.
PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including 400+Tools and 350+posts
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
Python AV Evasion Tools
windows-rs shellcode loaders
🎃 PumpBin is an Implant Generation Platform.
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
Process Injection using Thread Name
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
A collection of offensive Go packages inspired by different Go repositories.
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Resources About Shellcode
A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.
Various Process Injection Techniques
Some Rust program I wrote while learning Malware Development
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible
Add a description, image, and links to the shellcode-injection topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-injection topic, visit your repo's landing page and select "manage topics."