Print3M / shellcodesLinks
My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.
☆40Updated 11 months ago
Alternatives and similar repositories for shellcodes
Users that are interested in shellcodes are comparing it to the libraries listed below
Sorting:
- ☆107Updated 7 months ago
- Make an Linux Kernel rootkit visible again.☆52Updated 3 months ago
- Analyse MSI files for vulnerabilities☆137Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆57Updated 3 weeks ago
- Docker container for running CobaltStrike 4.10☆37Updated 9 months ago
- ☆31Updated 3 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆58Updated 9 months ago
- ☆16Updated last month
- ☆57Updated 2 months ago
- ECC Public Key Cryptography☆38Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated last year
- PowerShell script to generate ShellCode in various formats☆42Updated 9 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆113Updated 2 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 10 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Windows Administrator level Implant.☆49Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 8 months ago
- POC of GITHUB simple C2 in rust☆53Updated 5 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆50Updated last year
- EvtPsst☆55Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆53Updated 5 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆100Updated last year
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆76Updated 2 weeks ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year