Shellcode execution via x86 inline assembly based on MSVC syntax
☆17Apr 26, 2023Updated 2 years ago
Alternatives and similar repositories for Shell-we-Assembly
Users that are interested in Shell-we-Assembly are comparing it to the libraries listed below
Sorting:
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 3 months ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- ☆10Jul 1, 2023Updated 2 years ago
- Utilities for Pentesting with BloodHound☆22Feb 20, 2026Updated last month
- maldev obviously☆28May 5, 2025Updated 10 months ago
- NTLM/Negotiate authentication over HTTP that supports Pass The Hash Mode (PtH)☆17Sep 13, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- Multi-Arch docker image for boringtun☆12Aug 28, 2025Updated 6 months ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆10Oct 1, 2023Updated 2 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- SOCKS4/SOCKS4a/SOCKS5/HTTP/HTTPS fast proxy scanner☆53Sep 8, 2023Updated 2 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- kill AV/EDR☆21Jun 9, 2023Updated 2 years ago
- ☆40Nov 1, 2021Updated 4 years ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 7 months ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆15Oct 9, 2021Updated 4 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- Videocore Backend for llvm☆23Feb 3, 2015Updated 11 years ago
- Arch Linux package for the Linux Kernel and modules with grsecurity/PaX patches.☆20Apr 26, 2017Updated 8 years ago
- ☆15Sep 24, 2012Updated 13 years ago
- ☆12Aug 28, 2017Updated 8 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- An LLVM clone modified for use in RetDec and associated tools.☆19Feb 3, 2025Updated last year
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- Hardening your OS/Profile is like building with LEGO, incorporating a couple of Grsecurity features and implementing aggressive security …☆21Nov 24, 2025Updated 3 months ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Mar 25, 2022Updated 3 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Count how many bits are set (population count) in C++ using POPCNT via inline assembly and gcc intrinsics (with benchmarks)☆16May 9, 2011Updated 14 years ago