coleak2021 / PE64shellLinks
A packer which adds encrypted shell to protect your PE file
☆23Updated 7 months ago
Alternatives and similar repositories for PE64shell
Users that are interested in PE64shell are comparing it to the libraries listed below
Sorting:
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- Beacon compiled using clang☆69Updated 2 years ago
- 自用的shellcode生成框架☆32Updated 2 years ago
- shellcode生成框架☆87Updated last year
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆67Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆53Updated last year
- Simulate per-process disconnection in red team environments☆48Updated last month
- Self Cleanup in post-ex job☆56Updated 10 months ago
- A C Implementation for Bypassing Security Software☆27Updated 3 months ago
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated last year
- 域前置版本FRP☆15Updated 2 years ago
- ☆66Updated 11 months ago
- ☆26Updated last year
- An implementation of an indirect system call☆129Updated last year
- more conveniently Visual-Studio-BOF-template☆66Updated last year
- ☆41Updated last year
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆137Updated 8 months ago
- Shellcode Reductio Entropy Tools☆70Updated last year
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago
- A tool that expands the size of the text section in a PE file without loss, supporting both 32-bit and 64-bit programs.☆33Updated last year
- 重构Beacon☆15Updated 10 months ago
- Use COM Component Bypass UAC,Dll Version☆35Updated 4 years ago
- Rust 重构的 sRDI☆14Updated 10 months ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆44Updated 2 years ago
- Code with Windows Hacker☆13Updated 2 years ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆9Updated last year
- XOR 加密 分离免杀☆67Updated last year
- ☆91Updated 4 years ago
- kill AV/EDR☆22Updated 2 years ago
- 该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。☆38Updated last year