CX330Blake / Shellcode-IDELinks
Shellcode IDE — makes developing and analyzing shellcode much more convenient.
☆107Updated last month
Alternatives and similar repositories for Shellcode-IDE
Users that are interested in Shellcode-IDE are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆225Updated 8 months ago
- Collection of codes focused on Linux rootkits☆188Updated 2 months ago
- a tool used to analyze and monitor in named pipes☆193Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆164Updated 3 weeks ago
- ☆164Updated 9 months ago
- Windows rootkit designed to work with BYOVD exploits☆211Updated 11 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆264Updated last year
- ☆15Updated 9 months ago
- Source code for complete MALicious softWARE books I & II☆62Updated 2 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆420Updated 3 weeks ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆118Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆109Updated 3 years ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆323Updated 2 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆579Updated 3 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆121Updated 7 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆88Updated last month
- ☆159Updated 6 months ago
- Tools for analyzing EDR agents☆274Updated last year
- ☆105Updated last year
- Binary Exploitation Phrack CTF Challenge☆139Updated 4 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆316Updated last year
- Proof of concept & details for CVE-2025-21298☆191Updated 11 months ago
- kernel callback removal (Bypassing EDR Detections)☆206Updated last month
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆335Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆147Updated last year
- A repository for additional files related to the book Windows Security Internals with PowerShell from No Starch Press.☆213Updated 4 months ago
- ☆71Updated 11 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆165Updated 4 months ago
- early cascade injection PoC based on Outflanks blog post☆235Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆257Updated 4 months ago