DarkCoderSc / nasm-shell-pp
Uses NASM Shell Tool from Metasploit to friendly export Python / C / CPP shellcode from assembly instructions.
☆16Updated 4 years ago
Alternatives and similar repositories for nasm-shell-pp:
Users that are interested in nasm-shell-pp are comparing it to the libraries listed below
- ☆17Updated 3 years ago
- Shellcode Encoder using XOR. Supports bad characters.☆8Updated 4 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- C++/ CLI implementation of my read EOF Data from PE File lib.☆9Updated 4 years ago
- golang String Obfuscate☆9Updated 2 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- A script for SOC operators' first analysis. Add new player in the game.☆8Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- The best way to send emails in Go.☆10Updated 3 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated last month
- Obtain and parse SSL certificates☆9Updated 2 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 8 years ago
- ☆8Updated 3 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago