Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Jan 1, 2023 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Template-Driven AV/EDR Evasion Framework
Demos of various injection techniques found in malware
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
Loader for VAC Bypass written in C.
PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including 400+Tools and 350+posts
Advanced Game Hacking Library for C/C++, Rust and Python (Windows/Linux/FreeBSD) (Process/Memory Hacking) (Hooking/Detouring) (Cross Platform) (x86/x64/ARM/ARM64) (DLL/SO Injection) (Internal/External)
A set of tutorials about code injection for Windows.
Library for injecting a shared library into a Linux or Windows process
Search for code cave in all binaries
Automatic generate dll wrapper for code injection.
ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.
x64 Windows kernel driver mapper, inject unsigned driver using anycall
It's a vulnerability scanner tool for test Apache Path Traversal
sample linux x86_64 ELF virus
PoC for detecting and dumping code injection (built and extended on UnRunPE)
PHP 8.1.0-dev Backdoor System Shell Script
A helper tool that enables Optimus Player to stream audio using AirPlay 2.
Add a description, image, and links to the code-injection topic page so that developers can more easily learn about it.
To associate your repository with the code-injection topic, visit your repo's landing page and select "manage topics."