fr0gger / shellcode2exe_packageLinks
x64 Windows package of the shellcode2exe tool
☆14Updated 4 years ago
Alternatives and similar repositories for shellcode2exe_package
Users that are interested in shellcode2exe_package are comparing it to the libraries listed below
Sorting:
- ☆15Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- ☆48Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated last year
- Repository for dirty scripts and PoCs☆18Updated 4 months ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- ☆24Updated 4 months ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated 2 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆27Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- really ?☆12Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- AMSI detection PoC☆32Updated 5 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆22Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- ☆23Updated 3 years ago
- ☆25Updated 2 years ago
- ☆27Updated 2 years ago
- string encryption in Nim☆20Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- leaking net-ntlm with webdav☆25Updated 4 years ago
- ☆12Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 3 years ago