Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
-
Updated
Oct 6, 2024 - C++
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Template-Driven AV/EDR Evasion Framework
📦 Plugin, App, and Theme store which includes plugin injection for macOS
Advanced Game Hacking Library for C, Modern C++, Rust and Python (Windows/Linux/FreeBSD) (Process/Memory Hacking) (Hooking/Detouring) (Cross Platform) (x86/x64) (DLL/SO Injection) (Internal/External) (Assembler/Disassembler)
Demos of various injection techniques found in malware
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
Library for injecting a shared library into a Linux or Windows process
PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including 400+Tools and 350+posts
Loader for VAC Bypass written in C.
A set of tutorials about code injection for Windows.
Multilayered AV/EDR Evasion Framework
Search for code cave in all binaries
Automatic generate dll wrapper for code injection.
x64 Windows kernel driver mapper, inject unsigned driver using anycall
ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.
NLP model and tech for cyber security tasks
PHP 8.1.0-dev Backdoor System Shell Script
PoC for detecting and dumping code injection (built and extended on UnRunPE)
sample linux x86_64 ELF virus
Add a description, image, and links to the code-injection topic page so that developers can more easily learn about it.
To associate your repository with the code-injection topic, visit your repo's landing page and select "manage topics."