Compile shellcode into an exe file from Windows or Linux.
☆73Jun 7, 2025Updated 10 months ago
Alternatives and similar repositories for shcode2exe
Users that are interested in shcode2exe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Spoof parent process ID☆14Jan 23, 2019Updated 7 years ago
- ☆50May 12, 2021Updated 4 years ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- Rerousces related to time-travel debugging (TTD)☆37Jan 6, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆26Jun 30, 2021Updated 4 years ago
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 9 months ago
- ☆37Nov 8, 2024Updated last year
- ☆57Jan 15, 2024Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆467Aug 23, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆27Feb 5, 2026Updated 2 months ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆153Jul 20, 2022Updated 3 years ago
- Software Protector☆20Aug 16, 2020Updated 5 years ago
- A small x64 library to load dll's into memory.☆460Nov 6, 2023Updated 2 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- A .NET malware loader, using API-Hashing to evade static analysis☆209May 30, 2023Updated 2 years ago
- A lightweight .NET assembly dependency merger that uses dnLib and 7zip's LZMA SDK for compressing dependant assemblies.☆105Sep 4, 2024Updated last year
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Jan 21, 2017Updated 9 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- A tool to decrypt all Synology encrypted archives (SPK, PAT, ...)☆20Jun 6, 2025Updated 10 months ago
- Get information about stripped rust executables☆45May 16, 2025Updated 10 months ago
- MAPS cloud scanner and response parser for Microsoft Defender research.☆87Feb 19, 2026Updated last month
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆169Jan 30, 2021Updated 5 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Nov 5, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆287Oct 29, 2024Updated last year
- https://docs.qwqdanchun.com/☆28May 24, 2021Updated 4 years ago
- ☆124Oct 9, 2023Updated 2 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- ☆164Dec 30, 2022Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆27Nov 15, 2020Updated 5 years ago
- ☆52Nov 7, 2024Updated last year