CX330Blake / Shellcode-IDELinks
Shellcode IDE — makes developing and analyzing shellcode much more convenient.
☆112Updated 2 months ago
Alternatives and similar repositories for Shellcode-IDE
Users that are interested in Shellcode-IDE are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆226Updated 9 months ago
- ☆164Updated 11 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆324Updated 3 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- ☆163Updated 7 months ago
- Windows rootkit designed to work with BYOVD exploits☆214Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆120Updated last year
- a tool used to analyze and monitor in named pipes☆193Updated last year
- Collection of codes focused on Linux rootkits☆195Updated 3 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆90Updated 3 months ago
- Direct access to NTFS volumes☆292Updated 4 months ago
- ☆105Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆268Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆164Updated 2 months ago
- Obex – Blocking unwanted DLLs in user mode☆280Updated 4 months ago
- Tools for analyzing EDR agents☆276Updated last year
- early cascade injection PoC based on Outflanks blog post☆236Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆124Updated last year
- RunPE implementation with multiple evasive techniques (2)☆268Updated 4 months ago
- kernel callback removal (Bypassing EDR Detections)☆210Updated 2 months ago
- This is practice VM for malware development☆179Updated 2 months ago
- AppLocker-Based EDR Neutralization☆281Updated last month
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆113Updated 3 years ago
- Proof of concept & details for CVE-2025-21298☆194Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Updated last year
- Activation Context Hijack☆169Updated 6 months ago
- A Windows Named Pipe Multi-tool / Proxy☆283Updated 2 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Updated 5 months ago