Offensive Assembly code snippets.
☆13Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for ASM_World
Users that are interested in ASM_World are comparing it to the libraries listed below
Sorting:
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- An example of Windows self-replicating malware.☆11Jan 16, 2023Updated 3 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 9 months ago
- Demo from the Malware Analysis and Development Webinar☆25Apr 17, 2024Updated last year
- CreateRemoteThreadPlus: how to pass multiple parameters to the remote thread function without shellcode.☆139Jul 10, 2025Updated 8 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆59Sep 7, 2024Updated last year
- Get windows CPU temperature with WinRing0 driver and library☆25Jan 10, 2019Updated 7 years ago
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆65Mar 8, 2023Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated last year
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆147Feb 14, 2026Updated last month
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆129Aug 11, 2023Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- doesnt work and wont work on it anymore☆10Jul 8, 2024Updated last year
- Bypassing antivirus detection: old-school malware, new tricks☆67May 10, 2023Updated 2 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- A Frida MCP server to enable autonomous AI assistance for Android instrumentation☆35Feb 8, 2026Updated last month
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 3 years ago
- ☆16Mar 26, 2023Updated 2 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- DEFCON 31 slide deck and video link☆68Jun 2, 2025Updated 9 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- ☆15Apr 10, 2025Updated 11 months ago
- ☆27Oct 15, 2025Updated 5 months ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Just another repository for malware development☆13May 12, 2024Updated last year
- From directory deletion to SYSTEM shell☆111Apr 24, 2020Updated 5 years ago