7etsuo / win32-shellcodeLinks
Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers
☆60Updated 10 months ago
Alternatives and similar repositories for win32-shellcode
Users that are interested in win32-shellcode are comparing it to the libraries listed below
Sorting:
- ☆140Updated last month
- ☆189Updated last year
- ☆303Updated 8 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆178Updated last year
- ☆356Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆197Updated 3 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated last month
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆314Updated last year
- ☆282Updated last year
- Open Source C&C Specification☆262Updated 4 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆203Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆148Updated 5 months ago
- ☆119Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆278Updated 3 weeks ago
- early cascade injection PoC based on Outflanks blog post☆221Updated 8 months ago
- ☆300Updated 8 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆261Updated 8 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆188Updated 9 months ago
- Different methods to get current username without using whoami☆178Updated last year
- ☆260Updated last year
- 「💀」Proof of concept on BYOVD attack☆161Updated 7 months ago
- Find potential DLL Sideloads on your windows computer☆210Updated 6 months ago
- Collection of random RedTeam scripts.☆206Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆183Updated last week
- ☆131Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Offensive Lua.☆188Updated last year