T1erno / bin2shellcodeLinks
C++ tool and library for converting .bin files to shellcode in multiple output formats.
☆31Updated last week
Alternatives and similar repositories for bin2shellcode
Users that are interested in bin2shellcode are comparing it to the libraries listed below
Sorting:
- Tool to bypass LSA Protection (aka Protected Process Light)☆56Updated 7 months ago
- ☆53Updated 8 months ago
- ☆50Updated last month
- ☆30Updated 5 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆41Updated 2 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆43Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆47Updated 5 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated 11 months ago
- ☆28Updated 7 months ago
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 5 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- ☆98Updated 11 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Updated last year
- ☆53Updated 2 months ago
- ☆57Updated 10 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 10 months ago
- ☆73Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆101Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆54Updated 2 months ago
- ☆26Updated 9 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆26Updated 11 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆54Updated 4 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆26Updated 2 months ago
- Click Once + App Domain☆63Updated last year
- ☆41Updated 2 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆25Updated 11 months ago
- ☆35Updated 6 months ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago