CX330Blake / Shellcode-IDELinks
Shellcode IDE — makes developing and analyzing shellcode much more convenient.
☆110Updated 2 months ago
Alternatives and similar repositories for Shellcode-IDE
Users that are interested in Shellcode-IDE are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆226Updated 9 months ago
- Collection of codes focused on Linux rootkits☆192Updated 2 months ago
- ☆161Updated 7 months ago
- a tool used to analyze and monitor in named pipes☆193Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆164Updated last month
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆267Updated last year
- ☆164Updated 10 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 2 weeks ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆324Updated 3 months ago
- Windows rootkit designed to work with BYOVD exploits☆211Updated last year
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆590Updated this week
- Tools for analyzing EDR agents☆276Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆119Updated last year
- This is practice VM for malware development☆175Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post☆236Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- A Windows Named Pipe Multi-tool / Proxy☆240Updated last month
- ☆105Updated last year
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆89Updated 2 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆110Updated 3 years ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆149Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆260Updated 4 months ago
- RunPE implementation with multiple evasive techniques (2)☆265Updated 3 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆123Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆278Updated last year
- Proof of concept & details for CVE-2025-21298☆193Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- ☆333Updated 3 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆337Updated last year
- Direct access to NTFS volumes☆292Updated 4 months ago