GenZ Shellcode Generator to execute commands with winExec API
☆22Apr 27, 2025Updated 10 months ago
Alternatives and similar repositories for ShellcodeGenZ
Users that are interested in ShellcodeGenZ are comparing it to the libraries listed below
Sorting:
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 6 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 11 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Less sugar (entropy) for your binaries☆34Sep 10, 2025Updated 5 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 6 months ago
- Generate Proxy DLLs in Rust☆47Sep 2, 2025Updated 5 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆137Apr 6, 2025Updated 10 months ago
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 10 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆187Sep 19, 2025Updated 5 months ago
- ☆22Aug 16, 2025Updated 6 months ago
- An another JWT cracker but really fast!☆11Jan 26, 2023Updated 3 years ago
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- ☆13Mar 3, 2025Updated 11 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 9 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 4 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 8 months ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- Cobalt Strike random C2 Profile generator☆16Nov 10, 2025Updated 3 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Example agents for the Dreadnode platform☆22Dec 19, 2025Updated 2 months ago
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated last month
- 通过ptr记录使用ip反查内网域名☆16Sep 10, 2024Updated last year
- ☆109Feb 17, 2025Updated last year