☆13Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for Shellcode-Ghost
Users that are interested in Shellcode-Ghost are comparing it to the libraries listed below
Sorting:
- query specific user and login IP from remote machine☆18Nov 19, 2022Updated 3 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- 致远OA通过发送特殊请求获取管理员cookie,再通过文件上传接口上传webshell压缩文件,最后发送解压请求获取webshell☆10Apr 11, 2021Updated 4 years ago
- Hessian UTF-8 Overlong Encoding☆21Mar 9, 2024Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Feb 26, 2023Updated 3 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Support for UASM x86 and x64 assembler in RadASM 2.2.2.x☆24Aug 18, 2022Updated 3 years ago
- ☆122Jun 7, 2023Updated 2 years ago
- jsproxy助手是一款jsproxy代理的chrome插件☆11Jun 22, 2019Updated 6 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Shellcode Reductio Entropy Tools☆74Oct 8, 2023Updated 2 years ago
- Bypass Windows Defender☆62Jun 16, 2022Updated 3 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆99Oct 13, 2022Updated 3 years ago
- CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)☆22Jun 26, 2021Updated 4 years ago
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆165May 27, 2020Updated 5 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated last year
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- 魔改shadowsocks,实现socks5内网穿透。☆63Nov 28, 2025Updated 3 months ago
- Cobalt Strike BOF that Add an admin user☆79Oct 11, 2022Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆239Dec 7, 2020Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- 记录自己学习Java安全的过程,无技术含量 。☆30Aug 15, 2023Updated 2 years ago
- ☆38Mar 4, 2020Updated 6 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated 2 months ago
- The Triton - Dynamic Binary Analysis (DBA) framework - by JonathanSalwan binding for Delphi☆11Oct 25, 2023Updated 2 years ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- 安服面经☞渗透测试/代码审计/安全研究☆28May 3, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago