C++ tool and library for converting .bin files to shellcode in multiple output formats.
☆34Aug 18, 2025Updated 8 months ago
Alternatives and similar repositories for bin2shellcode
Users that are interested in bin2shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 10 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆100Jan 10, 2026Updated 3 months ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 3 months ago
- Bof of RegPwn by MDSec☆118Mar 15, 2026Updated last month
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 8 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆129Jan 26, 2026Updated 3 months ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Python based GUI for browsing LDAP☆181Dec 7, 2025Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆170Sep 22, 2025Updated 7 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆53Nov 9, 2025Updated 5 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆18Mar 4, 2023Updated 3 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 9 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆68Jan 13, 2026Updated 3 months ago
- Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer☆56Mar 22, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆76Mar 15, 2026Updated last month
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆191Jan 17, 2026Updated 3 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆161Nov 23, 2025Updated 5 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆107Apr 22, 2026Updated last week
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- ☆26Aug 11, 2025Updated 8 months ago
- Persistence via Shell Extensions☆64Aug 4, 2023Updated 2 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Injecting DLL into LSASS at boot☆156Apr 29, 2025Updated last year
- kerberos in rust for fun and profit☆71Mar 13, 2026Updated last month
- SMB Audit Tool you were looking for☆24Jun 16, 2023Updated 2 years ago
- Impacket☆50Feb 25, 2026Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 6 months ago
- Aliasr is a modern, feature-rich TUI launcher for pentest commands.☆108Updated this week
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆120Oct 6, 2025Updated 6 months ago