"Polymorphic" shellcode generator (x86)
☆26Oct 28, 2014Updated 11 years ago
Alternatives and similar repositories for PSG
Users that are interested in PSG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A C polymorphic and metamorphic engine☆74Jan 24, 2019Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- PYTinyDNS☆53Jul 2, 2014Updated 11 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Load PE via XML Attribute☆31Feb 1, 2020Updated 6 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆24Aug 2, 2018Updated 7 years ago
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Nov 24, 2024Updated last year
- ☆10Feb 14, 2017Updated 9 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- ☆13Apr 1, 2017Updated 8 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- A Credit Card Payment System - CCPS build with react, typescript, bootstrap, sass, react-transition, font-awesome☆11Mar 25, 2022Updated 3 years ago
- create metamorphic contracts using this template.☆14Mar 15, 2023Updated 3 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Network testing tool and traffic generator☆14Jan 15, 2020Updated 6 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- arp-poison (aka arp spoof) tool☆41Apr 9, 2013Updated 12 years ago
- A Hyper Casual and Drawing game created in unity 3d☆12Jul 11, 2023Updated 2 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago