g0mxxm / shellcode_extractor_for_maldocLinks
The code in this repository which function is to extract the shellcode from the maldoc.
☆10Updated last year
Alternatives and similar repositories for shellcode_extractor_for_maldoc
Users that are interested in shellcode_extractor_for_maldoc are comparing it to the libraries listed below
Sorting:
- Cobalt Strike DNS beacon parser☆11Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- Python Script to quickly check if a host is running NetScaler Gateway and/or AAA☆12Updated last year
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆19Updated 7 months ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Updated 8 months ago
- ☆17Updated last year
- ☆15Updated 5 years ago
- SyscallLoader☆11Updated 3 years ago
- TrojanDropper/PS.Maloader.d☆12Updated 3 years ago
- Exploit for CVE-2024-0402 in Gitlab☆12Updated 2 months ago
- ☆9Updated 3 years ago
- HTTP Protocol Stack CVE-2021-31166☆13Updated 7 months ago
- Post-Exploitation script to exfiltrate 7-zip files☆10Updated 2 years ago
- Golang wrapper for the Microsoft Antimalware Scan Interface (AMSI)☆11Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆26Updated last year
- works but not work, cao!☆24Updated 3 years ago
- ☆21Updated 4 years ago
- Slides from out talk at BH IL 2022☆28Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆14Updated 3 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 2 years ago
- The king of shell -Javaweb Memory Shell☆23Updated 2 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆30Updated 4 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- Windows Persistence Collection☆12Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago