DarkCoderSc / nasm-shell-ppLinks
Uses NASM Shell Tool from Metasploit to friendly export Python / C / CPP shellcode from assembly instructions.
☆16Updated 5 years ago
Alternatives and similar repositories for nasm-shell-pp
Users that are interested in nasm-shell-pp are comparing it to the libraries listed below
Sorting:
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 10 months ago
- Build myself for cs project☆12Updated 5 years ago
- ☆24Updated 4 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 6 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Malicious DLL Generator in Py3☆26Updated 5 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Companion Worm research☆16Updated 3 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 4 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆23Updated 4 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆15Updated 2 weeks ago
- Handy script to automate the attack☆22Updated 5 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 4 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- Router socks. One port socks for all the others.☆68Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Simple unpacking script for Ezuri ELF Crypter☆34Updated 4 years ago
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Updated 3 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Updated 7 years ago
- Chrome cookie dumper☆17Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 11 months ago
- post exploitation user monitoring tool☆20Updated 7 years ago