Process Hollowing Injector (C)
C source code for shellcode injection via process hollowing. Creates a suspended process, unmaps the original section, and injects the payload.
Professional offensive security tools & exploit frameworks
C source code for shellcode injection via process hollowing. Creates a suspended process, unmaps the original section, and injects the payload.
DLL template with integrated reflective loader. Loads into memory without touching disk or using LoadLibrary().
Core Remote Access Trojan module in Python. Encrypted communication, command execution, file transfer, and basic persistence.
Shellcode encoder with 8 encoding schemes: XOR rolling, AES stub, RC4, SUB/ADD chain, insertion, shikata-ga-nai style.
Windows kernel driver (KMDF) with process, file, and network connection hiding capabilities. Includes usermode loader.
Standalone keylogger module using SetWindowsHookEx. Captures keystrokes, identifies active window, saves to encrypted log.
Packer/crypter source code for PE executables. Encrypts the .text section, adds decryption stub, modifies entry point.
PowerShell loader that downloads and executes payload in memory without writing to disk. AMSI bypass included.
Python/C library for C2 communication over HTTP/S, DNS, and ICMP. Custom protocol with encryption and steganography.
10 Windows persistence techniques implemented in code: Registry, Scheduled Tasks, WMI Events, COM Hijack, DLL Search Order, and more.