bdamele / shellcodeexecLinks
Script to execute in memory a sequence of opcodes
☆411Updated 11 years ago
Alternatives and similar repositories for shellcodeexec
Users that are interested in shellcodeexec are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept exploits for CVE-2017-11882☆495Updated 7 years ago
- A python reverse shell that uses DNS as the c2 channel☆508Updated 9 years ago
- Win32k LPE vulnerability used in APT attack☆288Updated 7 years ago
- Dump various types of Windows credentials without injecting in any process.☆427Updated 2 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆456Updated 4 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆329Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325Updated 9 years ago
- UAC 0day, all day!☆279Updated 8 years ago
- Learn from Casey Smith @subTee☆242Updated 8 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆207Updated 8 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆302Updated 9 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆330Updated 8 years ago
- CVE-2018-8120 Windows LPE exploit☆499Updated 7 years ago
- Automated DLL Enumerator☆538Updated 7 years ago
- BEURK Experimental Unix RootKit☆382Updated 8 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- LibZeroEvil & the Research Rootkit project.☆595Updated 3 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- Sample Rootkit for Linux☆399Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆527Updated 4 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆470Updated 8 years ago
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆257Updated 4 years ago
- Create a TCP circuit through validly formed HTTP requests☆350Updated 8 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- dump☆494Updated 6 years ago
- ☆164Updated 7 years ago
- Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.☆231Updated 6 years ago
- Netview enumerates systems using WinAPI calls☆297Updated 3 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆211Updated 2 years ago