Repository contains shellcodes made from scratch for intel x86-64 bit Architecture
☆12May 6, 2023Updated 2 years ago
Alternatives and similar repositories for SHELLCODING_INTEL_x86-64
Users that are interested in SHELLCODING_INTEL_x86-64 are comparing it to the libraries listed below
Sorting:
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- Exports monitoring plugin for x64dbg☆22Mar 14, 2023Updated 2 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- ☆50May 12, 2021Updated 4 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Aug 11, 2023Updated 2 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- ☆30Dec 26, 2021Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- Information for accessing The Cyber Plumber's Handbook Lab☆31Oct 10, 2022Updated 3 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- YouTube/Livestream project for obfuscating C# source code using Roslyn☆129May 9, 2021Updated 4 years ago
- LPE exploit for CVE-2023-36802☆24Oct 10, 2023Updated 2 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆84May 3, 2023Updated 2 years ago
- Windows Etw LPE☆51Oct 12, 2021Updated 4 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- WinDbg installer/updater☆45Jul 11, 2023Updated 2 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- TestStand Semiconductor Module Python API☆15May 7, 2025Updated 10 months ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- Read my blog for more info -☆31Apr 27, 2021Updated 4 years ago
- Example code for EDR bypassing☆151Mar 7, 2019Updated 7 years ago
- Execute ShellCode / "Inline-Assembler" in Python☆43Jan 3, 2017Updated 9 years ago
- ☆37May 16, 2021Updated 4 years ago