alphaSeclab / shellcode-resources
Resources About Shellcode
☆203Updated 4 years ago
Related projects: ⓘ
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆96Updated 4 years ago
- ☆137Updated this week
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆243Updated 4 years ago
- CVE-2019-1458 Windows LPE Exploit☆134Updated 4 years ago
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆79Updated 3 years ago
- Collection of 0days & Ndays☆165Updated 3 years ago
- source code☆181Updated 5 years ago
- x64 printable shellcode encoder☆150Updated 4 years ago
- 破解CS4.0☆159Updated 4 years ago
- ClamAV_0Day_exploit☆89Updated 4 years ago
- ☆207Updated last month
- Beacon.dll reverse☆134Updated 3 years ago
- POCs for Shellcode Injection via Callbacks☆388Updated 3 years ago
- writeup of CVE-2020-1362☆230Updated 4 years ago
- 40行代码检测到大部分CobaltStrike的shellcode☆260Updated 3 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆242Updated 4 years ago
- Steal privileged token to obtain SYSTEM shell☆244Updated 4 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆255Updated 3 years ago
- X86 version of syswhispers2 / x86 direct system call☆314Updated 3 years ago
- Atredis Partners Security Advisories☆53Updated 2 months ago
- Windows对抗沙箱和虚拟机的方法总结☆380Updated 4 years ago
- Resources About Anti-Virus and Anti-Anti-Virus, including 200+ tools and 1300+ posts☆427Updated 4 years ago
- ☆371Updated 8 months ago
- Windows Security Resources☆58Updated 2 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆135Updated 4 years ago
- ☆43Updated this week
- Hide process,port,self under Linux using the ld_preload☆158Updated 2 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆138Updated 4 years ago
- weaponized tool for CVE-2020-17144☆157Updated 3 years ago
- bypass uac☆140Updated 6 years ago