Sys-Calls
System call injection library
An implementation of Windows System Calls in C# to bypass anti-malware detection and inject a meterpreter shell.
An example of using Syscalls in C# to get a meterpreter shell.
107 stars
2 watching
26 forks
Language: C#
last commit: about 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
plackyhacker/shellcode-injection-techniques | A collection of C# techniques for injecting malicious shellcode into processes | 447 |
stevemk14ebr/polyhook_2_0 | A C++20 library for hooking and manipulating system calls on x86/x64 platforms | 1,607 |
saprykin/plibsys | A portable C system library providing various low-level functionality including threading, synchronization, networking, and data structures. | 691 |
suvllian/process-inject | A collection of Windows process injection methods implemented in C. | 644 |
portswigger/command-injection-attacker | An OS command injection detection and exploitation tool that provides methodologies and software for identifying and exploiting vulnerabilities in applications. | 107 |
hzllaga/jsloader | A tool that generates and embeds malicious shellcode in JavaScript to evade detection by antivirus software and ensure persistence after installation. | 357 |
apokryptein/secinject | A tool for injecting malicious code into processes using native APIs and memory section mapping. | 87 |
amzn/awsssmchaosrunner | A library for simulating system failures and testing the resilience of AWS services | 249 |
jthack/pipe | A guide to help developers understand and mitigate the security risks of prompt injection in AI-powered applications and features. | 359 |
bohops/rogueassemblyhunter | A utility for discovering and identifying malicious .NET modules in running processes. | 115 |
csvl/sema | Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior | 94 |
kpcyrd/rshijack | A tool that hijacks TCP connections by injecting packets into existing connections to intercept data | 463 |
syssec-kaist/sigover_injector | A tool that exploits weaknesses in LTE broadcast signals to inject manipulated signals without an FBS. | 89 |
s0md3v/jshell | A tool for delivering JavaScript shells via XSS attacks using a Python script | 511 |
plioi/parsley | A parsing library inspired by Haskell's Parsec and F#'s FParsec. | 61 |