☆12Feb 4, 2025Updated last year
Alternatives and similar repositories for FlexSheller
Users that are interested in FlexSheller are comparing it to the libraries listed below
Sorting:
- The eJPT is a practical penetration testing certification provided by elearnsecurity. Here you will find course notes and the cheat sheet…☆22Nov 3, 2025Updated 4 months ago
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Jan 29, 2015Updated 11 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 2 months ago
- ☆65Dec 19, 2024Updated last year
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Sniffing files generator☆62Feb 24, 2025Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- ☆50Jun 4, 2025Updated 9 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 6 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- ☆38Jan 7, 2025Updated last year
- Example for PagedOut!☆26Oct 22, 2019Updated 6 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 4 months ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 10 months ago
- ☆26Dec 29, 2021Updated 4 years ago
- ☆62Oct 3, 2025Updated 5 months ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 5 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆125Jul 11, 2025Updated 8 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆189Jan 17, 2026Updated 2 months ago
- shell code example☆68Dec 12, 2025Updated 3 months ago
- ☆14Dec 26, 2024Updated last year
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆51Nov 2, 2025Updated 4 months ago
- ☆21Feb 18, 2025Updated last year
- ☆30Mar 15, 2026Updated last week
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 2 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆140Jul 2, 2025Updated 8 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- DLL injection with Microsoft detours☆22Dec 9, 2025Updated 3 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously