compilepeace / SHELLCODING_INTEL_x86-64Links
Repository contains shellcodes made from scratch for intel x86-64 bit Architecture
☆12Updated 2 years ago
Alternatives and similar repositories for SHELLCODING_INTEL_x86-64
Users that are interested in SHELLCODING_INTEL_x86-64 are comparing it to the libraries listed below
Sorting:
- Windows GPU rootkit PoC by Team Jellyfish☆36Updated 10 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 5 years ago
- ☆24Updated 3 years ago
- really ?☆12Updated last year
- ☆15Updated 2 years ago
- ☆22Updated 2 years ago
- ☆11Updated 6 years ago
- A simple PE loader.☆26Updated 2 years ago
- ☆48Updated 4 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆33Updated last year
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆50Updated 2 years ago
- ☆16Updated 4 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- ☆31Updated 5 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 3 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- ☆55Updated 2 years ago
- x64 Registration-Free In-Process COM Automation Server.☆50Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Updated 3 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Nice try reading NTDLL from disk, nerd.☆19Updated 3 years ago