Simple Shellcode Runner in Rust Language
☆18Dec 8, 2023Updated 2 years ago
Alternatives and similar repositories for shellcode-runner-rust
Users that are interested in shellcode-runner-rust are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- ☆12Nov 22, 2024Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 10 months ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- LFI to RCE tool.☆15May 10, 2020Updated 5 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- A script that checks a bunch of obvious cyber-security stuff in order to try and compromise a host through it's open services.☆13Apr 17, 2022Updated 3 years ago
- 🎇Vision: great List of Regex, Patterns, Google queries, public SPARQL, SQL, NoSQL - Regular Expressions(=Search Patterns=Data type defin…☆12Jul 9, 2025Updated 8 months ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 3 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- Using Hotel Data to predict High Value And Potential VIP Guests☆12Dec 27, 2021Updated 4 years ago
- Honeypot FTP server written in .NET Core (C#) for both Linux and Windows.☆14Dec 8, 2022Updated 3 years ago
- C# Process Hollowing POC☆18Jan 5, 2023Updated 3 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆90Nov 9, 2023Updated 2 years ago
- Repository for slide decks of public talks I've given.☆14Apr 23, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A curated list of token bonding curve code and resources.☆11Sep 4, 2020Updated 5 years ago
- Blockchain Attack Simulator (BCASim) is an Open Source Blockchain Simulator for Attack Analysis☆17Dec 21, 2025Updated 3 months ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- OSCP Study Guide☆41Oct 10, 2022Updated 3 years ago
- WinHTTP example☆17Feb 6, 2016Updated 10 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Archive of Metasploit CTF challenges.☆14Jan 21, 2022Updated 4 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- rootkit for tryhackme king of the hill☆12Apr 7, 2024Updated last year
- A reference implementation for automatically deploying a full-featured IRC server with Let's Encrypt, Anope services, and more☆11Apr 24, 2018Updated 7 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago