ihack4falafel / SlinkView external linksLinks
Alphanumeric Shellcode (x86) Encoder
☆75Feb 24, 2022Updated 3 years ago
Alternatives and similar repositories for Slink
Users that are interested in Slink are comparing it to the libraries listed below
Sorting:
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 3 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 3 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 6 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 3 years ago
- Load C# Code straight to memory☆56May 14, 2020Updated 5 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Jul 7, 2017Updated 8 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Aug 4, 2021Updated 4 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- ☆122Mar 6, 2018Updated 7 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- shell for nasm☆65Jun 3, 2020Updated 5 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- A Burp Suite Professional extension for decrypting/decoding various types of cookies.☆12Jun 12, 2019Updated 6 years ago
- Assorted Cereals☆10Nov 13, 2021Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆102Jul 30, 2019Updated 6 years ago
- x64 Windows Exploit Development☆116Aug 24, 2024Updated last year
- A small utility to run raw code chunks in the executable memory area.☆17Feb 6, 2015Updated 11 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago