SHAREM is a shellcode analysis framework, capable of emulating more than 45,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
☆480Mar 22, 2026Updated last month
Alternatives and similar repositories for sharem
Users that are interested in sharem are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆173Apr 12, 2026Updated 3 weeks ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆251Jul 9, 2024Updated last year
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Aug 11, 2023Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,014Jun 4, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆820Mar 16, 2024Updated 2 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆503Feb 3, 2022Updated 4 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- A modern 32/64-bit position independent implant template☆1,320Mar 21, 2025Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆135Jan 2, 2023Updated 3 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆953Jul 20, 2024Updated last year
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- Converts PE into a shellcode☆2,760Aug 30, 2025Updated 8 months ago
- Performing Indirect Clean Syscalls☆612Updated this week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A tool to kill antimalware protected processes☆1,515Jun 19, 2021Updated 4 years ago
- PoCs and tools for investigation of Windows process execution techniques☆957Feb 2, 2026Updated 3 months ago
- Shoggoth: Asmjit Based Polymorphic Encryptor☆786Apr 4, 2026Updated last month
- AV/EDR evasion via direct system calls.☆1,814Sep 3, 2022Updated 3 years ago
- kill anti-malware protected processes ( BYOVD )☆974Jul 21, 2023Updated 2 years ago
- Dynamic unpacker based on PE-sieve☆810Apr 14, 2026Updated 3 weeks ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆724Jul 19, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆1,103Jun 17, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,627Jul 31, 2024Updated last year
- A Pin Tool for tracing API calls etc☆1,649Feb 8, 2026Updated 2 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆503Jan 10, 2023Updated 3 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Jul 12, 2024Updated last year
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 3 months ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆201Jan 13, 2022Updated 4 years ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,053Jun 20, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,325Feb 15, 2026Updated 2 months ago
- Yet another variant of Process Hollowing☆465Jul 31, 2025Updated 9 months ago
- Alternative Shellcode Execution Via Callbacks☆1,713Nov 11, 2022Updated 3 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆174Jul 20, 2024Updated last year
- ☆1,812Aug 30, 2024Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- x64 binary obfuscator☆1,971Jul 14, 2023Updated 2 years ago