Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).
☆16Sep 1, 2025Updated 6 months ago
Alternatives and similar repositories for run-shellcode-in-memory
Users that are interested in run-shellcode-in-memory are comparing it to the libraries listed below
Sorting:
- ☆36Jan 30, 2026Updated last month
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26☆10Aug 28, 2024Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- ☆34Oct 25, 2023Updated 2 years ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆10Oct 1, 2019Updated 6 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- A collection of config files for linux focusing on hackthebox theme☆53Oct 10, 2025Updated 5 months ago
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆12Dec 23, 2023Updated 2 years ago
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago
- ☆15Nov 18, 2020Updated 5 years ago
- ☆39May 4, 2025Updated 10 months ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- Burp Suite extension to easily export sub domains☆12Dec 2, 2019Updated 6 years ago
- ☆46Nov 22, 2025Updated 3 months ago
- After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools t…☆17Oct 25, 2021Updated 4 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- A collection of various exploits☆29Sep 17, 2024Updated last year
- simple network signature/rule intrusion detection system written in Python.☆15Jun 10, 2024Updated last year
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Sep 11, 2023Updated 2 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Oct 6, 2020Updated 5 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆117Mar 25, 2023Updated 2 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- My personal knowledge repository☆15Mar 7, 2026Updated 2 weeks ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- A simple, LFI vulnerable PHP application☆18Sep 27, 2018Updated 7 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago