hacksysteam / ShellcodeOfDeathLinks
Shellcode Of Death
☆42Updated 12 years ago
Alternatives and similar repositories for ShellcodeOfDeath
Users that are interested in ShellcodeOfDeath are comparing it to the libraries listed below
Sorting:
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- ☆23Updated 9 years ago
- DLL Injection Library & Tools☆72Updated 9 years ago
- Code injection via delay load libraries☆35Updated 8 years ago
- ☆46Updated 7 years ago
- Introduce you to shellcode development.☆23Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- ☆54Updated 8 years ago
- Gozi-MBR-rootkit Bootkit Modified☆71Updated 9 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- The exploit for Panda AV LPE☆37Updated 6 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆45Updated 7 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Updated 9 years ago
- Making shellcode UD - https://osandamalith.com☆25Updated 9 years ago
- Various Crypter Project☆53Updated 11 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 12 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- a open source rat from china☆26Updated 9 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Kernel mode windows NT API logger☆22Updated 6 years ago
- ☆34Updated 7 years ago