hacksysteam / ShellcodeOfDeathLinks
Shellcode Of Death
☆38Updated 11 years ago
Alternatives and similar repositories for ShellcodeOfDeath
Users that are interested in ShellcodeOfDeath are comparing it to the libraries listed below
Sorting:
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- ☆23Updated 9 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- public bugs/proof of concepts☆51Updated 4 years ago
- ☆53Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 8 years ago
- Introduce you to shellcode development.☆23Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- ☆45Updated 7 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆52Updated 7 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- ☆22Updated 8 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 8 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- [Windows] Local Privilege Escalation - WebClient☆58Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 7 years ago
- Gozi-MBR-rootkit Bootkit Modified☆70Updated 8 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆27Updated 9 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆19Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- powershell to hide process by kd.exe☆32Updated 4 years ago
- ☆28Updated 8 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆45Updated 4 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago