fr0gger / shellcode2exe_packageLinks
x64 Windows package of the shellcode2exe tool
☆14Updated 4 years ago
Alternatives and similar repositories for shellcode2exe_package
Users that are interested in shellcode2exe_package are comparing it to the libraries listed below
Sorting:
- ☆15Updated 2 years ago
- AMSI detection PoC☆32Updated 5 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆22Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆28Updated 2 years ago
- ☆48Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Updated 4 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆65Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- ☆12Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Right-To-Left Override POC☆36Updated 3 years ago
- ☆25Updated 6 months ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- ☆37Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago