Neetx / Shellcode-ExtractorLinks
Python script to extract shellcode from object/executable files
☆15Updated 3 years ago
Alternatives and similar repositories for Shellcode-Extractor
Users that are interested in Shellcode-Extractor are comparing it to the libraries listed below
Sorting:
- Assembly language files and Shellcode☆37Updated 4 years ago
- Reverse text segment x64 ELF infector written in Assembly☆20Updated 4 years ago
- An ELF / PE binary packer written in pure C, made for fun☆104Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- Another linux ELF packer to evade hash detection.☆35Updated 4 years ago
- https://0xrick.github.io/win-internals/pe8/☆49Updated 4 years ago
- ☆90Updated 5 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- PT_NOTE to PT_LOAD x64 ELF infector written in Assembly☆49Updated 4 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Let's try to create a rootkit!☆20Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆40Updated 4 years ago
- Encrypt C functions☆42Updated 2 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆74Updated 2 years ago
- ☆17Updated 2 years ago
- Assembly block for hooking windows API functions.☆92Updated 6 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆78Updated 2 years ago
- Tracing and parsing an executing binary file☆29Updated 10 years ago
- ☆49Updated 3 years ago
- a collection of elf file infectors☆27Updated 4 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆56Updated 3 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 4 months ago
- API Hooking Engine on Windows 10☆12Updated last year
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆31Updated 2 years ago