bfosterjr / portfwd
☆13Updated 10 years ago
Alternatives and similar repositories for portfwd:
Users that are interested in portfwd are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- Spoof parent process ID☆13Updated 6 years ago
- Showing how proof-of-work can be used to evade antivirus emulators.☆11Updated 5 months ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- Another Portable Executable files analysing stuff☆21Updated 13 years ago
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- ☆12Updated 5 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- ☆20Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- ☆15Updated last year
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 3 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- A collection of anti disassembly techniques☆19Updated 7 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆27Updated 5 years ago
- ☆21Updated 3 years ago
- really ?☆12Updated last year
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Updated 3 years ago