Quantumite / slidecode
XOR-based shellcode encoder
☆31Updated last year
Related projects ⓘ
Alternatives and complementary repositories for slidecode
- Collection of Rust repos useful for Red Teamers.☆30Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆51Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆53Updated 7 months ago
- ☆46Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆25Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆31Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Remotely dump NT hashes through Windows Crash dumps☆26Updated 3 weeks ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 8 months ago
- ☆18Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆81Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- ADSI based SA tool☆16Updated 2 years ago
- The Web UI for Antnium☆25Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆23Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆51Updated 3 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- BYOVD collection☆20Updated 8 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆28Updated last year
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated last year