7etsuo / win32-shellcode
Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers
☆54Updated 4 months ago
Alternatives and similar repositories for win32-shellcode:
Users that are interested in win32-shellcode are comparing it to the libraries listed below
- ☆294Updated 2 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆303Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆249Updated 7 months ago
- Open Source C&C Specification☆224Updated this week
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 7 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated last year
- ☆329Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆183Updated 6 months ago
- ☆250Updated 11 months ago
- ☆185Updated 11 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆159Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆335Updated last month
- Different methods to get current username without using whoami☆173Updated 11 months ago
- ☆131Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆179Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆330Updated 7 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆172Updated 4 months ago
- Find potential DLL Sideloads on your windows computer☆168Updated last week
- ☆105Updated 6 months ago
- ☆296Updated 2 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆262Updated 8 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆284Updated last year
- early cascade injection PoC based on Outflanks blog post☆194Updated 2 months ago
- Collect Windows telemetry for Maldev☆268Updated last week
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆372Updated 5 months ago
- ☆269Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆152Updated last month
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆251Updated last year