0dayNinja / egghunter_shellcodeLinks
Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode
β12Updated 4 years ago
Alternatives and similar repositories for egghunter_shellcode
Users that are interested in egghunter_shellcode are comparing it to the libraries listed below
Sorting:
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)β13Updated 4 years ago
- πα΄ Κα΄Ι΄Ι’ Κα΄α΄ α΄Κsα΄ sΚα΄ΚΚπβ11Updated 3 years ago
- Random Tips and Writeups.β15Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β33Updated 6 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded sβ¦β17Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationβ18Updated 5 years ago
- recover Firefox and more browsers loginsβ49Updated 4 years ago
- DNS hijacking via dead records automation toolβ53Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β19Updated 4 years ago
- π Python Exploit for CVE-2022-23935β11Updated 2 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.β35Updated last year
- Process injection via KernelCallbackTableβ13Updated 4 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)β16Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloadsβ26Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.β48Updated 3 years ago
- β18Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.β50Updated this week
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blogβ13Updated 6 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.β17Updated 5 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injectionβ28Updated 5 years ago
- The Hall of Ancient Exploitation Toolsβ16Updated 6 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Proβ¦β21Updated 5 years ago
- β13Updated 4 years ago
- Collection of scripts that I created to make my life easier.β12Updated 4 years ago
- β17Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementationβ12Updated 3 years ago
- Cross-platform malware development library for anti-analysis techniquesβ25Updated 4 years ago
- Red Team C2 and Post Exploitation codeβ34Updated 7 months ago