Paulo-D2000 / ShellCodeObfuscatorLinks
Simple shellcode obfuscator using PYTHON and C / C++
☆74Updated 4 years ago
Alternatives and similar repositories for ShellCodeObfuscator
Users that are interested in ShellCodeObfuscator are comparing it to the libraries listed below
Sorting:
- Kernel file/process/object tool☆67Updated 3 years ago
- ☆51Updated 5 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 4 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- Hijack Printconfig.dll to execute shellcode☆98Updated 4 years ago
- MappingInjection via csharp☆38Updated 3 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆55Updated 3 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- ☆35Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- UAC_wenpon☆48Updated 3 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- ☆37Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- Tool to get NT system shell .☆24Updated 3 years ago
- Load the evilDLL from socket connection without touch disk☆16Updated 3 years ago
- My personal shellcode loader☆31Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- RDI implementation in Nim☆64Updated 4 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- Loads shellcode from a resource file.☆22Updated 5 years ago
- Cobalt Strike BOF Files with Nim!☆85Updated 2 years ago
- my learning case about windows☆21Updated 3 years ago
- ☆74Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- Injects shellcode into remote processes using direct syscalls☆78Updated 4 years ago
- A simple hidden vnc.☆32Updated 4 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago