0dayNinja / Linux-x86-Reverse-ShellLinks
Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)
☆13Updated 4 years ago
Alternatives and similar repositories for Linux-x86-Reverse-Shell
Users that are interested in Linux-x86-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Updated 4 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆50Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- ☆58Updated 4 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- pwncat windows c2 components☆21Updated 4 years ago
- Seven different DLL injection techniques in one single project.☆13Updated 5 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆68Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Nice try reading NTDLL from disk, nerd.☆19Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- ☆18Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- ☆17Updated 2 years ago
- Malicious DLL Generator in Py3☆27Updated 5 years ago
- Let's try to create a rootkit!☆19Updated 5 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 3 years ago