Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).
☆16Sep 1, 2025Updated 8 months ago
Alternatives and similar repositories for run-shellcode-in-memory
Users that are interested in run-shellcode-in-memory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆39Jan 30, 2026Updated 3 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26☆10Aug 28, 2024Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- ☆34Oct 25, 2023Updated 2 years ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆10Oct 1, 2019Updated 6 years ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- A collection of config files for linux focusing on hackthebox theme☆55Apr 10, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Simple C++ Reverse Shell☆12Nov 22, 2022Updated 3 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- ☆10Feb 20, 2026Updated 2 months ago
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆13Dec 23, 2023Updated 2 years ago
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago
- ☆15Nov 18, 2020Updated 5 years ago
- ☆44May 4, 2025Updated 11 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 3 years ago
- Burp Suite extension to easily export sub domains☆12Dec 2, 2019Updated 6 years ago
- ☆46Nov 22, 2025Updated 5 months ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- Transition form local file inclusion attacks to remote code exection☆69Aug 26, 2020Updated 5 years ago
- A collection of various exploits☆29Sep 17, 2024Updated last year
- simple network signature/rule intrusion detection system written in Python.☆15Jun 10, 2024Updated last year
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Sep 11, 2023Updated 2 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Oct 6, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆118Mar 25, 2023Updated 3 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools t…☆20Oct 25, 2021Updated 4 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- A simple, LFI vulnerable PHP application☆18Sep 27, 2018Updated 7 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago