Darkabode / 0ctrl
Zerokit server controller
☆13Updated 6 years ago
Alternatives and similar repositories for 0ctrl:
Users that are interested in 0ctrl are comparing it to the libraries listed below
- User-mode part of Zerokit platform☆20Updated 6 years ago
- Zerokit shared code☆16Updated 6 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Capture Webcam Reflective Dll☆8Updated 9 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 9 years ago
- KernelBugTest☆15Updated 7 years ago
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Updated 7 years ago
- ☆11Updated 6 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago
- ☆17Updated 6 years ago
- Common Malware Techniques☆13Updated 2 years ago
- ☆10Updated 10 years ago
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- hooking KiUserApcDispatcher☆24Updated 8 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 4 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Component Services Volatile Environment LPE☆11Updated 5 months ago
- Reverse Windows shell over TLS☆18Updated 9 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Post-explotation Hacks☆14Updated 6 years ago