Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
-
Updated
Mar 11, 2024 - C
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
My implementation of enSilo's Process Doppelganging (PE injection technique)
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
PE loader with various shellcode injection techniques
ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports payload-side
PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible
Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping
ProcessGhosting 技术的 rust 实现版本
A process injection technique using only thread context manipulation
The RunPE program is written in C# to execute a specific executable file within another files memory using the ProcessHollowing technique.
MS Word , PPT Macros VBA payload Dropper tool ⏳
This python tool injects shellcode in Windows Program Executable to backdoor it with optional polymorphism.
Add a description, image, and links to the pe-injector topic page so that developers can more easily learn about it.
To associate your repository with the pe-injector topic, visit your repo's landing page and select "manage topics."