hackerhouse-opensource / shellcode
shellcode are codes designed to be injected into the memory space of another process during exploitation.
☆46Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for shellcode
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated 7 months ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- ☆10Updated 4 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆11Updated 5 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Local Privilege Escalation Miner☆24Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- The Hunt for Malicious Strings☆11Updated 4 years ago
- ☆14Updated 9 months ago
- ☆16Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆36Updated 3 years ago