compilepeace / SHELLCODING_INTEL_x86-64
Repository contains shellcodes made from scratch for intel x86-64 bit Architecture
☆12Updated last year
Alternatives and similar repositories for SHELLCODING_INTEL_x86-64:
Users that are interested in SHELLCODING_INTEL_x86-64 are comparing it to the libraries listed below
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated last year
- really ?☆12Updated 10 months ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- ☆11Updated 5 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated last year
- Dangling COM Keys Finder☆15Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated 11 months ago
- Remove API hooks from a Beacon process.☆13Updated 3 years ago
- ☆31Updated 4 years ago
- ☆10Updated 3 years ago
- ☆12Updated 4 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Example for PagedOut!☆24Updated 5 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆26Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆37Updated 3 years ago
- API Hooking Engine on Windows 10☆12Updated 8 months ago
- example using NtCreateUserProcess in rust☆17Updated last month
- ☆15Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Remote PE reflective injection with a simple reflective loader☆30Updated 5 years ago