shellcode are codes designed to be injected into the memory space of another process during exploitation.
☆51Feb 2, 2026Updated 3 weeks ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below
Sorting:
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 3 weeks ago
- cve-2018-10933 libssh authentication bypass☆109Feb 2, 2026Updated 3 weeks ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆463Updated this week
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 3 weeks ago
- AES-256 Microsoft Cryptography API Example Use.☆34Feb 2, 2026Updated 3 weeks ago
- ☆13Jul 13, 2020Updated 5 years ago
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆22Oct 1, 2016Updated 9 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Jul 20, 2014Updated 11 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 11 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- ☆21Jan 8, 2026Updated last month
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated 3 weeks ago
- Offensive Lua.☆223Feb 2, 2026Updated 3 weeks ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆12Oct 26, 2018Updated 7 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆15Sep 21, 2020Updated 5 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- ☆11May 5, 2015Updated 10 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- Detonate malware on VMs and get logs & detection status☆83Jan 29, 2026Updated last month
- Source code for HappyHack☆12May 26, 2019Updated 6 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆17Dec 2, 2024Updated last year
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago