C++ tool and library for converting .bin files to shellcode in multiple output formats.
☆33Aug 18, 2025Updated 6 months ago
Alternatives and similar repositories for bin2shellcode
Users that are interested in bin2shellcode are comparing it to the libraries listed below
Sorting:
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 2 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated last month
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 6 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- ☆26Aug 11, 2025Updated 6 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- Bloodhound python Ingestor using ADWS☆31Feb 4, 2026Updated 3 weeks ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆104Jan 26, 2026Updated last month
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Updated this week
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- Python based GUI for browsing LDAP☆180Dec 7, 2025Updated 2 months ago
- SMB Audit Tool you were looking for☆24Jun 16, 2023Updated 2 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 3 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆65Jan 13, 2026Updated last month
- Windows Kernel Security: Memory Integrity Verification with Disk Verification of ntoskrnl.exe☆15Mar 23, 2025Updated 11 months ago
- ☆20Sep 6, 2025Updated 5 months ago
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆18Jun 20, 2025Updated 8 months ago
- ☆15May 30, 2025Updated 8 months ago
- NSecSoftBYOVD POC☆56Feb 12, 2026Updated 2 weeks ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆115Oct 6, 2025Updated 4 months ago
- Persistence via Shell Extensions☆64Aug 4, 2023Updated 2 years ago
- The different ways to dump lsass☆264Aug 15, 2025Updated 6 months ago
- ☆22Aug 16, 2025Updated 6 months ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆34Oct 1, 2025Updated 4 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆167Sep 22, 2025Updated 5 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 6 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆68Dec 26, 2025Updated 2 months ago
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- Local SYSTEM auth trigger for relaying☆168Jul 22, 2025Updated 7 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Jan 14, 2026Updated last month
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago