T1erno / bin2shellcodeLinks
C++ tool and library for converting .bin files to shellcode in multiple output formats.
☆33Updated 5 months ago
Alternatives and similar repositories for bin2shellcode
Users that are interested in bin2shellcode are comparing it to the libraries listed below
Sorting:
- ☆53Updated 4 months ago
- A portable C# utility for enumerating local and remote windows sessions☆55Updated 3 weeks ago
- ☆100Updated last year
- ☆33Updated last year
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆47Updated last week
- Execute commands, in/exfiltrate files using your custom RPC Server☆59Updated 2 weeks ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆75Updated this week
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Updated 3 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- ☆50Updated 6 months ago
- Less sugar (entropy) for your binaries☆34Updated 4 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆57Updated last month
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 7 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Updated last year
- ☆49Updated 7 months ago
- ☆55Updated 7 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Updated 10 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Updated 7 months ago
- ☆74Updated last year
- DFSCoerce exe revisited version with custom authentication☆41Updated 2 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 9 months ago
- ☆33Updated 10 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆18Updated 7 months ago