Script to execute in memory a sequence of opcodes
☆415Jun 23, 2014Updated 11 years ago
Alternatives and similar repositories for shellcodeexec
Users that are interested in shellcodeexec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple reverse ICMP shell☆1,617Apr 6, 2018Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Sep 26, 2016Updated 9 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Shellcode Compiler☆1,154Sep 1, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Miscellaneous tools and patches that I have written/hacked/forked over the years☆64Dec 27, 2011Updated 14 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆459Mar 2, 2021Updated 5 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Check for valid credentials across a network over SMB☆268Jan 5, 2024Updated 2 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,390Jun 17, 2022Updated 3 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,549Aug 2, 2019Updated 6 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆762Jan 28, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,433Oct 30, 2023Updated 2 years ago
- Shellcode launcher utility☆479Feb 16, 2014Updated 12 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,866Jun 28, 2024Updated last year
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆693Dec 29, 2017Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆301May 5, 2016Updated 9 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,273Sep 4, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆652Mar 14, 2024Updated 2 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- A "tiny" meterpreter stager☆128Aug 20, 2019Updated 6 years ago
- Post Exploitation Collection☆1,573May 1, 2020Updated 5 years ago
- Token Privilege Research☆877Sep 1, 2017Updated 8 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 9 years ago
- An automated SMB relay exploitation script.☆152Oct 11, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Win32k LPE vulnerability used in APT attack☆291Dec 18, 2017Updated 8 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Sep 1, 2021Updated 4 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆342Jul 30, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,017Jul 3, 2018Updated 7 years ago