Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.
☆48Apr 7, 2025Updated 11 months ago
Alternatives and similar repositories for shellcode-tester-pro
Users that are interested in shellcode-tester-pro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Apr 28, 2025Updated 11 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- ☆54Oct 13, 2025Updated 5 months ago
- Privilege Escalation using Passwd - April Fools prank☆37Apr 3, 2025Updated 11 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- ☆159Apr 4, 2025Updated 11 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 7 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆203Apr 21, 2025Updated 11 months ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 9 months ago
- ☆47Mar 7, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code …☆12Jun 16, 2022Updated 3 years ago
- AI-VAPT is an autonomous AI-driven Vulnerability Assessment & Penetration Testing framework combining traditional VAPT with neural intell…☆90Oct 7, 2025Updated 5 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated last year
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated last week
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 8 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- ☆12Feb 20, 2025Updated last year
- ☆18Sep 27, 2025Updated 6 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Comprehensive Protection Against Deepfakes, Deepnudes & Harmful Content☆19Jan 3, 2026Updated 2 months ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 9 months ago
- pdf-js-inject,能够将js代码注入到pdf文件中,也可以注入xss-payload到pdf文件中☆31Sep 8, 2024Updated last year
- POC for CVE-2025-54918 and a technical demonstration.☆56Jan 12, 2026Updated 2 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆118Mar 8, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆22Updated this week
- Windows Event Log Killer☆12May 22, 2017Updated 8 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆120Jun 10, 2025Updated 9 months ago
- ☆39May 4, 2025Updated 10 months ago
- ☆197Apr 23, 2025Updated 11 months ago