Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Mar 18, 2024 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Template-Driven AV/EDR Evasion Framework
Demos of various injection techniques found in malware
PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including 400+Tools and 350+posts
Loader for VAC Bypass written in C.
Library for injecting a shared library into a Linux or Windows process
Advanced Game Hacking Library for C/C++, Rust and Python (Windows/Linux/FreeBSD) (Process/Memory Hacking) (Hooking/Detouring) (Cross Platform) (x86/x64/ARM/ARM64) (DLL/SO Injection) (Internal/External) (Assembler/Disassembler)
A set of tutorials about code injection for Windows.
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
Search for code cave in all binaries
Automatic generate dll wrapper for code injection.
📦 Plugin, App, and Theme store which includes plugin injection for macOS
It's a vulnerability scanner tool for test Apache Path Traversal 👾
x64 Windows kernel driver mapper, inject unsigned driver using anycall
ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.
NLP model and tech for cyber security tasks
PoC for detecting and dumping code injection (built and extended on UnRunPE)
Add a description, image, and links to the code-injection topic page so that developers can more easily learn about it.
To associate your repository with the code-injection topic, visit your repo's landing page and select "manage topics."