shellcode are codes designed to be injected into the memory space of another process during exploitation.
☆51Feb 2, 2026Updated 3 months ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 3 months ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆468Feb 22, 2026Updated 2 months ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 3 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated 3 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆35Feb 2, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 2 months ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 3 months ago
- ☆16Feb 12, 2022Updated 4 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- automates exploits using ROP chains, using ntdll-scraper☆15May 26, 2022Updated 3 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆27Jul 26, 2024Updated last year
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Feb 2, 2026Updated 3 months ago
- ☆15Mar 2, 2014Updated 12 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Some handy script to collect hosts installed redis (using Shodan search engine) and exploit them☆18Aug 20, 2016Updated 9 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- unix-like reverse engineering framework and commandline tools☆10Mar 10, 2023Updated 3 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆322Feb 2, 2026Updated 3 months ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆110Feb 2, 2026Updated 3 months ago
- Red Teaming Tradecraft☆38Sep 28, 2022Updated 3 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 6 years ago
- 几个UAC Bypass的方法☆12Apr 13, 2018Updated 8 years ago
- ☆20Jan 8, 2026Updated 4 months ago