compilepeace / SHELLCODING_INTEL_x86-64
Repository contains shellcodes made from scratch for intel x86-64 bit Architecture
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for SHELLCODING_INTEL_x86-64
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- really ?☆12Updated 8 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- ☆12Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆30Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Example for PagedOut!☆24Updated 5 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago
- example using NtCreateUserProcess in rust☆15Updated last week
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- ☆48Updated last year
- ☆24Updated 3 years ago
- Dangling COM Keys Finder☆14Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated 9 months ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated last year
- Yet another Windows DLL injector.☆38Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆37Updated 3 years ago
- ☆45Updated 3 years ago
- A COFF Loader written in Rust☆26Updated 2 weeks ago
- ☆22Updated 4 years ago
- ☆10Updated 3 years ago
- ☆18Updated 11 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆30Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago