pe-injection
Here are 10 public repositories matching this topic...
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
- Updated
Mar 11, 2024 - C
PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including 400+Tools and 350+posts
- Updated
May 25, 2020
execute PE in memory Filelessly
- Updated
Feb 8, 2025 - Python
ProcessGhosting 技术的 rust 实现版本
- Updated
Oct 23, 2024 - Rust
PE File Code Cave Helper (Backdooring and/or Basic Section Obfuscation)
- Updated
Nov 9, 2020 - Python
Explanation and Proof of Concept of the Process Hollowing (Windows) technique, commonly used by malware and game hackers to bypass security systems
- Updated
Mar 17, 2025 - C++
Sample code for pe injection.
- Updated
Jul 8, 2020 - C++
Windows malware training and development.
- Updated
Nov 7, 2024 - Assembly
An wrapper app calling a child subprocess, allowing to ignore its crashes. Useful for building software with buggy tools
- Updated
Oct 30, 2020 - C
Improve this page
Add a description, image, and links to thepe-injection topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with thepe-injection topic, visit your repo's landing page and select "manage topics."