☆13Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for Shellcode-Ghost
Users that are interested in Shellcode-Ghost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- query specific user and login IP from remote machine☆18Nov 19, 2022Updated 3 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- 致远OA通过发送特殊请求获取管理员cookie,再通过文件上传接口上传webshell压缩文件,最后发送解压请求获取webshell☆10Apr 11, 2021Updated 4 years ago
- Hessian UTF-8 Overlong Encoding☆21Mar 9, 2024Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Feb 26, 2023Updated 3 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Support for UASM x86 and x64 assembler in RadASM 2.2.2.x☆24Aug 18, 2022Updated 3 years ago
- ☆123Jun 7, 2023Updated 2 years ago
- jsproxy助手是一款jsproxy代理的chrome插件☆11Jun 22, 2019Updated 6 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Shellcode Reductio Entropy Tools☆74Oct 8, 2023Updated 2 years ago
- Bypass Windows Defender☆62Jun 16, 2022Updated 3 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆99Oct 13, 2022Updated 3 years ago
- CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)☆22Jun 26, 2021Updated 4 years ago
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆166May 27, 2020Updated 5 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated 2 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- 魔改shadowsocks,实现socks5内网穿透。☆63Nov 28, 2025Updated 4 months ago
- Cobalt Strike BOF that Add an admin user☆80Oct 11, 2022Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆239Dec 7, 2020Updated 5 years ago
- 记录自己学习Java安全的过程,无技术含量 。☆31Aug 15, 2023Updated 2 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆38Mar 4, 2020Updated 6 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The Triton - Dynamic Binary Analysis (DBA) framework - by JonathanSalwan binding for Delphi☆11Oct 25, 2023Updated 2 years ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆91Dec 15, 2022Updated 3 years ago
- 安服 面经☞渗透测试/代码审计/安全研究☆28May 3, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 5 months ago