accidentalrebel / shcode2exe
Compile shellcode into an exe file from Windows or Linux.
☆65Updated 4 years ago
Alternatives and similar repositories for shcode2exe:
Users that are interested in shcode2exe are comparing it to the libraries listed below
- Experiment on reproducing Obfuscate & Sleep☆142Updated 4 years ago
- Bypass Malware Time Delays☆100Updated 2 years ago
- ☆112Updated 2 years ago
- ☆82Updated 6 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- Windows API Hashes used in the malwares☆41Updated 9 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Updated 2 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆105Updated last month
- Deleting Shadow Copies In Pure C++☆114Updated 2 years ago
- Evasive Process Hollowing Techniques☆137Updated 4 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- Overwrite a process's recovery callback and execute with WER☆103Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆136Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆71Updated 3 years ago
- Enabled / Disable LSA Protection via BYOVD☆66Updated 3 years ago
- ☆42Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆100Updated 2 years ago
- It's pointy and it hurts!☆124Updated 2 years ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆36Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- Simple EDR implementation to demonstrate bypass☆171Updated 4 years ago
- ☆28Updated 3 years ago
- Next gen process injection technique☆45Updated 4 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆98Updated last year
- Building and Executing Position Independent Shellcode from Object Files in Memory☆157Updated 4 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆36Updated 3 years ago