My personal shellcode loader
☆32Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for ShellCodeExec
Users that are interested in ShellCodeExec are comparing it to the libraries listed below
Sorting:
- ☆20Jul 23, 2023Updated 2 years ago
- Get windows CPU temperature with WinRing0 driver and library☆25Jan 10, 2019Updated 7 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- ☆12May 28, 2021Updated 4 years ago
- a small wiper malware programmed in c#☆59Nov 17, 2022Updated 3 years ago
- A small shellcode loader library written in C#☆48Dec 21, 2021Updated 4 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆62Jan 29, 2026Updated last month
- Re-implement cmd.exe using windows api☆50Feb 7, 2023Updated 3 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- ☆61Jan 9, 2023Updated 3 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆293Jul 15, 2023Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- LdrLoadDll Unhooking☆135Jan 16, 2022Updated 4 years ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆92Mar 23, 2023Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- ☆87Jan 21, 2025Updated last year
- PE Viewer☆212Jan 24, 2026Updated last month
- An attempt at reversing WindowsDefender☆20Oct 6, 2024Updated last year
- A small PoC that creates processes in Windows☆187Jun 6, 2024Updated last year
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- Think APIMonitor, but for .NET binaries.☆61Feb 22, 2023Updated 3 years ago
- Take a screenshot without injection for Cobalt Strike☆203Jun 7, 2023Updated 2 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆175Mar 15, 2023Updated 3 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- ☆91Jun 29, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆98Mar 20, 2023Updated 3 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- ☆138Aug 2, 2022Updated 3 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆62Aug 31, 2022Updated 3 years ago