From C to binary shellcode converter.
☆55Nov 11, 2025Updated 3 months ago
Alternatives and similar repositories for c-to-shellcode
Users that are interested in c-to-shellcode are comparing it to the libraries listed below
Sorting:
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆45Aug 12, 2025Updated 6 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Jun 9, 2025Updated 8 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- ☆126Sep 1, 2024Updated last year
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆43Nov 9, 2025Updated 3 months ago
- shell code example☆68Dec 12, 2025Updated 2 months ago
- ☆10Jul 1, 2023Updated 2 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆91Aug 21, 2025Updated 6 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆186Jan 17, 2026Updated last month
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- This program detects if any security software (AV, EDR, XDR, firewall, etc.) is running on the system. The program searches the list of r…☆50Jan 13, 2026Updated last month
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆199May 29, 2025Updated 9 months ago
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 8 months ago
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 10 months ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆121Dec 23, 2022Updated 3 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Jan 30, 2026Updated last month
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last week
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- ☆48Dec 21, 2025Updated 2 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago
- PoC for thread pool based process injection in Windows.☆122Mar 29, 2025Updated 11 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆65Dec 16, 2023Updated 2 years ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 10 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- ☆58Feb 19, 2026Updated last week
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 2 months ago