Project for tracking publicly disclosed DLL Hijacking opportunities.
- Updated
![]() |
VOOZH | about |
Project for tracking publicly disclosed DLL Hijacking opportunities.
Weaponize DLL hijacking easily. Backdoor any function in any DLL.
Automated DLL Sideloading Tool With EDR Evasion Capabilities
Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.
Shellcode loader written in C and Assembly utilizing direct or indirect syscalls to evade UM EDR hooks
ApexLdr is a DLL Payload Loader written in C
Red team tool designed for quickly identifying hijackable programs, evading antivirus software, and EDR (Endpoint Detection and Response) systems. 红队工具旨在快速识别可劫持程序、逃避防病毒软件和 EDR(端点检测和响应)系统。
Demonstrating 3 persistence layers from a single EXE, that converts itself into proxy DLLs at runtime
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
Rust DLL Search Order Hijacking
Advanced PowerShell-based red team implant along with a custom C2 (Command & Control) server
PowerShell script to find, report, and mitigate (where possible) EXEs with exploitable DLLs
Automatically find sideload opportunities and generate DLLs
Detect and confirm Windows DLL hijacking risks by automating the discovery and validation of vulnerable binaries and misconfigurations.
Add a description, image, and links to the dll-sideloading topic page so that developers can more easily learn about it.
To associate your repository with the dll-sideloading topic, visit your repo's landing page and select "manage topics."