compilepeace / SHELLCODING_INTEL_x86-64Links
Repository contains shellcodes made from scratch for intel x86-64 bit Architecture
☆12Updated 2 years ago
Alternatives and similar repositories for SHELLCODING_INTEL_x86-64
Users that are interested in SHELLCODING_INTEL_x86-64 are comparing it to the libraries listed below
Sorting:
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13Updated 2 years ago
- ☆22Updated 2 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated 2 years ago
- really ?☆12Updated last year
- Neutralize KEPServerEX anti-debugging techniques☆33Updated 2 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 4 years ago
- Just another casual shellcode native loader☆25Updated 3 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆30Updated 4 years ago
- Progress of learning kernel development☆14Updated 3 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A simple PE loader.☆27Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- x64 Registration-Free In-Process COM Automation Server.☆50Updated 3 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Updated 4 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Updated last year
- ☆14Updated 4 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16Updated last year
- ☆12Updated 6 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Updated 4 years ago
- Dangling COM Keys Finder☆17Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- ☆60Updated 3 years ago
- ☆31Updated 5 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated 3 years ago
- Example RPC service for blog post☆17Updated 6 years ago