OoOverflow / reverse_dns_shell
☆15Updated 8 years ago
Related projects: ⓘ
- No inline asm,support x86/x64☆63Updated 3 years ago
- 感染MBR 下载并运行文件。☆33Updated 2 years ago
- cve-2019-0808-poc☆47Updated 5 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆44Updated 11 years ago
- Penetration test☆55Updated 3 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 6 years ago
- ☆12Updated this week
- ☆18Updated 8 years ago
- DNS反弹shell客户端☆12Updated 8 years ago
- ☆32Updated 7 years ago
- a simple app like CKnife☆12Updated 5 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- A C++ API which is useful for Win32. Includes a communication subsystem.☆14Updated 6 years ago
- crash poc & Leak info PoC☆18Updated 6 years ago
- ☆22Updated this week
- POC for CVE-2018-0824☆85Updated last year
- Small tool to load shellcodes or PEs to analyze them☆79Updated 6 years ago
- Dll Convert to Shellcode.☆41Updated 2 years ago
- 基 于行为的Ransomware检测原型☆40Updated 6 years ago
- ☆36Updated 4 years ago
- Rapid generation ShellCode☆59Updated 7 years ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆26Updated 6 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Updated 6 years ago
- Introduce you to shellcode development.☆23Updated 8 years ago
- 此项目可用于Firefox,chrome,opera浏览器的登录信息的解密。☆27Updated 5 years ago
- a open source rat from china☆24Updated 7 years ago
- ☆26Updated this week
- reversed emet tool☆24Updated 11 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆80Updated 3 years ago
- ☆34Updated this week