"Polymorphic" shellcode generator (x86)
☆26Oct 28, 2014Updated 11 years ago
Alternatives and similar repositories for PSG
Users that are interested in PSG are comparing it to the libraries listed below
Sorting:
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- A C polymorphic and metamorphic engine☆74Jan 24, 2019Updated 7 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- ☆10Feb 14, 2017Updated 9 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Personal Troller is a C# console application to torment your friends' work day.☆10Dec 31, 2017Updated 8 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Network testing tool and traffic generator☆14Jan 15, 2020Updated 6 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 10 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- ☆13Apr 1, 2017Updated 8 years ago
- arp-poison (aka arp spoof) tool☆41Apr 9, 2013Updated 12 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Compiler exploits and exploitable non-obvious source code back doors.☆48Nov 24, 2024Updated last year
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆13Oct 28, 2024Updated last year
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Apr 17, 2021Updated 4 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago