A simple PoC of injection shellcode into a remote process and get the output using namepipe
☆45Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for interactive-execute-shellcode
Users that are interested in interactive-execute-shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆203Dec 27, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- Generate Shellcode Loaders & Injects☆159May 15, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆442Dec 21, 2023Updated 2 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆136Sep 20, 2025Updated 6 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆166Jan 4, 2024Updated 2 years ago
- Do some DLL SideLoading magic☆91Sep 20, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 2 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Mar 10, 2024Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Jan 12, 2023Updated 3 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Jan 14, 2024Updated 2 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆127Sep 1, 2024Updated last year
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- ☆52Mar 30, 2026Updated last week
- ☆13May 21, 2025Updated 10 months ago
- .net config loader☆349Nov 9, 2023Updated 2 years ago
- Remote Shellcode Injector☆219Aug 27, 2023Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- CPP AV/EDR Killer☆480Nov 28, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated last year
- C++ self-Injecting dropper based on various EDR evasion techniques.☆427Feb 11, 2024Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆291Jun 18, 2025Updated 9 months ago