Skip to content

injecting arbitrary codes in memory to bypass common antivirus solutions

License

Notifications You must be signed in to change notification settings

P0cL4bs/hanzoInjection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HanzoInjection

the HanzoIjection is a tool focused on injecting arbitrary codes in memory to bypass common antivirus solutions

the HanzoIjection is a tool focused on injecting arbitrary codes in memory to by
pass common antivirus solutions.

Developer: Mharcos Nesster (mh4x0f)
Email:[email protected]
Greetx:  P0cL4bs Team { N4sss , MMXM , Chrislley, MovCode, joridos }
-------------------------------------------------------------------


Arguments Options:

        OPTION        TYPE       DESCRIPTION
       -e,--execute  [.raw]      Name of file.bin, payload metasploit type raw
       -p,--payload  [.raw]      Payload meterpreter type [RAW]  requered parameter -o [output]
       -o,--output   [file.cs]   Output generate project file.cs injection memory payload c#
       -h,--help     [Help]      show this help and exit

Example Usage:

        HanzoInjection.exe -e payload_meterpreter.bin
        HanzoInjection.exe -p meterpreter.bin -o injection_memory.cs

Video Demo: https://www.youtube.com/watch?v=1Bb7ZuM3sho&list=UUx8AOiQBPughNfA-PsASZ9w

About

injecting arbitrary codes in memory to bypass common antivirus solutions

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages