Bw3ll / ShellWasp
ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Windows syscalls. ShellWasp is built for 32-bit, WoW64. ShellWasp 2.0 includes novel ways to invoke the syscall in WoW64.
☆160Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ShellWasp
- Building and Executing Position Independent Shellcode from Object Files in Memory☆153Updated 3 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆250Updated last year
- EDRSandblast-GodFault☆240Updated last year
- You shall pass☆249Updated 2 years ago
- Reuse open handles to dynamically dump LSASS.☆234Updated 7 months ago
- Experiment on reproducing Obfuscate & Sleep☆139Updated 3 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆227Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆110Updated last year
- ☆112Updated 2 years ago
- Patch AMSI and ETW☆232Updated 6 months ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆175Updated last year
- ETW based POC to identify direct and indirect syscalls☆173Updated last year
- ☆128Updated 2 years ago
- The code is a pingback to the Dark Vortex blog:☆163Updated last year
- miscellaneous scripts and programs☆215Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆313Updated last year
- Beacon Object File Loader☆273Updated 11 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆209Updated 2 months ago
- ☆133Updated last year
- POC for frustrating/defeating Malware Analysts☆150Updated 2 years ago
- Hookers are cooler than patches.☆166Updated 2 years ago
- ☆181Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆174Updated last year
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆346Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆135Updated 6 months ago
- A fake AMSI Provider which can be used for persistence.☆139Updated 3 years ago