danielhenrymantilla / shellcode-factory
Tool to create and test shellcodes from custom assembly sources (with some encoding options)
☆35Updated 6 years ago
Alternatives and similar repositories for shellcode-factory:
Users that are interested in shellcode-factory are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- ☆36Updated 5 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- ☆15Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- Experiments with git blobs☆9Updated 6 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- ☆12Updated 8 years ago
- ☆24Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆17Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago