Loading...
TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.

TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.
TikiTorch is a process injection tool that enables code execution within the address space of target processes. The tool implements various process injection techniques to allow users to run arbitrary code in the context of other running processes. This capability is commonly used in penetration testing and red team operations to bypass security controls and maintain persistence on compromised systems. TikiTorch supports multiple injection methods and provides flexibility in choosing the appropriate technique based on the target environment and security controls in place. The tool is designed to work with Windows systems and can be used to inject both managed and unmanaged code into target processes. The process injection capabilities include techniques for bypassing application whitelisting, endpoint detection systems, and other security mechanisms that monitor process creation and execution.
Common questions about TikiTorch including features, pricing, alternatives, and user reviews.
TikiTorch is TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.. It is a Security Operations solution designed to help security teams with Red Team, Evasion, Windows.
A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.
A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.
A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
Red team toolkit for EDR evasion, initial access, and post-exploitation.
EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.
Get strategic cybersecurity insights in your inbox