hacksysteam / ShellcodeOfDeathLinks
Shellcode Of Death
☆42Updated 12 years ago
Alternatives and similar repositories for ShellcodeOfDeath
Users that are interested in ShellcodeOfDeath are comparing it to the libraries listed below
Sorting:
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Introduce you to shellcode development.☆23Updated 9 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- ☆54Updated 8 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 10 years ago
- x86_64 linux rootkit using debug registers☆53Updated 4 years ago
- ☆46Updated 7 years ago
- ☆23Updated 9 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Powershell to CodeExecution and ProcessInjection☆65Updated 8 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆37Updated 12 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- ☆34Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- The exploit for Panda AV LPE☆37Updated 6 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Updated 7 years ago
- [Windows] Local Privilege Escalation - WebClient☆59Updated 8 years ago
- Trigger and exploit code for CVE-2014-4113☆42Updated 9 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆20Updated 9 years ago