jonatanSh / shelfLinks
Python library to convert elf to os-independent shellcodes
☆61Updated 2 years ago
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below
Sorting:
- LPE exploit for CVE-2023-36802☆165Updated 2 years ago
- ☆137Updated last year
- An implementation of an indirect system call☆131Updated 2 years ago
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆105Updated 2 years ago
- Windows Defender VDM lua collections☆48Updated 3 years ago
- shellcode-loaders and beacon-loaders☆71Updated last year
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆73Updated 3 years ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated 2 years ago
- ☆141Updated 7 months ago
- Simulate per-process disconnection in red team environments☆111Updated 4 months ago
- Learnings about windows Internals☆97Updated last year
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆151Updated 2 years ago
- Beacon compiled using clang☆71Updated 2 years ago
- ☆242Updated 2 years ago
- ☆15Updated 3 years ago
- Windows LPE☆134Updated last year
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆62Updated last year
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆61Updated 2 years ago
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆143Updated 3 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- ☆294Updated 3 years ago
- Offensive tools written for practice purposes☆162Updated 3 years ago
- Tired of looking at hex all day and popping '\x41's? Rather look at Lugia/Charmander? I have the solution for you.☆126Updated 3 years ago
- ☆61Updated 2 years ago
- ☆48Updated 3 years ago
- The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/☆189Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆52Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆28Updated 2 weeks ago