jonatanSh / shelfLinks
Python library to convert elf to os-independent shellcodes
☆59Updated last year
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below
Sorting:
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆104Updated 2 years ago
- LPE exploit for CVE-2023-36802☆162Updated last year
- ☆131Updated last year
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆70Updated 2 years ago
- An implementation of an indirect system call☆129Updated last year
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆149Updated last year
- shellcode-loaders and beacon-loaders☆64Updated last year
- Beacon compiled using clang☆70Updated 2 years ago
- ☆240Updated last year
- Windows Defender VDM lua collections☆47Updated 2 years ago
- ☆58Updated 8 months ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated last year
- C2☆103Updated 3 months ago
- Tired of looking at hex all day and popping '\x41's? Rather look at Lugia/Charmander? I have the solution for you.☆124Updated 2 years ago
- ☆139Updated 3 months ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆52Updated 2 years ago
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆59Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆100Updated last month
- A swiss army knife tool for running, injecting and organizing your BOFs collection☆59Updated last week
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- Windows LPE☆127Updated last year
- Learnings about windows Internals☆94Updated last year
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆174Updated 2 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆60Updated 2 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆67Updated 2 years ago
- dlopen() filelessly a shared object or even a program (and run it).☆55Updated last year
- bring your own vulnerable driver☆100Updated 2 years ago
- ☆273Updated 3 years ago