hacksysteam / ShellcodeOfDeathLinks
Shellcode Of Death
☆42Updated 12 years ago
Alternatives and similar repositories for ShellcodeOfDeath
Users that are interested in ShellcodeOfDeath are comparing it to the libraries listed below
Sorting:
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Introduce you to shellcode development.☆23Updated 9 years ago
- ☆23Updated 9 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- ☆54Updated 8 years ago
- ☆46Updated 7 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- powershell to hide process by kd.exe☆31Updated 4 years ago
- Powershell to CodeExecution and ProcessInjection☆65Updated 8 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Updated 9 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 4 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 6 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 7 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Updated 7 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 8 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆17Updated 7 years ago
- Gozi-MBR-rootkit Bootkit Modified☆71Updated 9 years ago
- The exploit for Panda AV LPE☆37Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago