XOR-based shellcode encoder
☆30Apr 20, 2023Updated 2 years ago
Alternatives and similar repositories for slidecode
Users that are interested in slidecode are comparing it to the libraries listed below
Sorting:
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- Nameless C2 - A C2 with all its components written in Rust☆284Sep 26, 2024Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- ☆39Sep 26, 2022Updated 3 years ago
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated last week
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated last year
- ☆79Aug 2, 2023Updated 2 years ago
- ☆18Oct 28, 2025Updated 4 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆262Jun 29, 2024Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 10 months ago
- Terminate AV/EDR leveraging BYOVD attack☆103Mar 21, 2025Updated 11 months ago
- ☆19Nov 28, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆68Aug 31, 2024Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- Archive of Metasploit Framework v1 (Perl)☆13Sep 29, 2014Updated 11 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Dec 15, 2024Updated last year
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Aug 24, 2022Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆210Nov 2, 2023Updated 2 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- Click Once + App Domain☆67Feb 23, 2026Updated 3 weeks ago