m0n0ph1 / shellcode-2
x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris
☆15Updated 7 years ago
Alternatives and similar repositories for shellcode-2:
Users that are interested in shellcode-2 are comparing it to the libraries listed below
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- ☆28Updated 6 months ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- ☆31Updated 4 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- ☆21Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year
- API hashing written in C to load APIs indirectly using CRC32 hashing☆14Updated 4 years ago
- Currently proof-of-concept☆16Updated 3 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- ☆11Updated 6 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Detour hooking IRQ1 ISR through IDT (Interrupt Descriptor Table)☆19Updated 2 years ago
- exploit termdd.sys(support kb4499175)☆59Updated 5 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- Reverse Windows shell over TLS☆18Updated 9 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Example for PagedOut!☆24Updated 5 years ago
- ☆33Updated 3 years ago
- ☆20Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆22Updated 5 years ago