killeven / ObjToShellCodeLinks
Rapid generation ShellCode
☆61Updated 8 years ago
Alternatives and similar repositories for ObjToShellCode
Users that are interested in ObjToShellCode are comparing it to the libraries listed below
Sorting:
- From 32-bit process to 64-bit process☆69Updated 4 years ago
- shellcode注入测试工具☆51Updated 6 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Updated 12 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆38Updated 10 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 4 years ago
- No inline asm,support x86/x64☆66Updated 4 years ago
- x64 dll hijacking tool(like AheadLib)☆57Updated 4 years ago
- Windows CVE主防(HIPS/HIDS)☆56Updated 4 years ago
- 安全卫士r3工具集☆37Updated 5 years ago
- Thanks to all those who helped me.☆20Updated 7 years ago
- Small tool to load shellcodes or PEs to analyze them☆83Updated 7 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆35Updated 4 years ago
- Shellcode to load an appended Dll☆89Updated 4 years ago
- 过去写的一些Windows安全研究相关代码☆135Updated 6 years ago
- dll转shellcode工具☆101Updated 5 years ago
- sc4cpp is a shellcode framework based on C++☆92Updated 4 years ago
- Convert PE files to a shellcode☆80Updated 5 years ago
- inject dll from kernal mode to user mode process use Apc☆33Updated 5 years ago
- 反射式注入☆29Updated 6 years ago
- PE文件打包器。将一系列的插件dll(寄生dll),打包捆绑到 目标exe中,以寄生的方式改变程序的原有行为。寄生的dll完全手动装配,隐藏执行;宿主被恢复后,会被寄生dll强势再感染。☆24Updated 12 years ago
- Only for research and learning, not for commercial and illegal use☆11Updated 6 years ago
- 沙箱测试,测评国内常见沙箱的代码与结论☆103Updated 4 years ago
- Penetration test☆55Updated 4 years ago
- 使用C++控制台实现的加壳器☆83Updated 6 years ago
- ☆58Updated 7 years ago
- Kill Protected Process Light Process (include av)☆58Updated 2 years ago
- ☆22Updated 4 years ago
- ida提取特征码脚本☆56Updated 5 years ago
- Search for information from manifests☆46Updated 6 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆35Updated 6 years ago