hacksysteam / ShellcodeOfDeathLinks
Shellcode Of Death
☆41Updated 12 years ago
Alternatives and similar repositories for ShellcodeOfDeath
Users that are interested in ShellcodeOfDeath are comparing it to the libraries listed below
Sorting:
- Introduce you to shellcode development.☆23Updated 9 years ago
- ☆23Updated 9 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Code injection via delay load libraries☆35Updated 8 years ago
- ☆45Updated 7 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 4 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆27Updated 9 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆52Updated 7 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 8 years ago
- ☆53Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 6 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Gozi-MBR-rootkit Bootkit Modified☆72Updated 8 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- ☆55Updated 8 years ago
- Various Crypter Project☆52Updated 11 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆24Updated 7 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆45Updated 4 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago