A collection of shellcode hashes
☆17Aug 15, 2018Updated 7 years ago
Alternatives and similar repositories for shellcode_hashes
Users that are interested in shellcode_hashes are comparing it to the libraries listed below
Sorting:
- ☆13Jul 15, 2021Updated 4 years ago
- ARM平台逆向工程学习笔记☆17Aug 18, 2018Updated 7 years ago
- ☆48May 12, 2021Updated 4 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- ☆33Jan 23, 2025Updated last year
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- python ShellCode Loader (Cobaltstrike&Metasploit)☆20Nov 28, 2019Updated 6 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 8 months ago
- General Content☆25Dec 23, 2025Updated 2 months ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- Easily reproduce Go binaries☆34Feb 16, 2026Updated last week
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147May 23, 2022Updated 3 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- ☆12Jul 7, 2023Updated 2 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- Position-independent Reflective Loader for macOS☆112Feb 19, 2026Updated last week
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Feb 18, 2025Updated last year
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated last week
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- 要是不做开源的话,我可能早就财务自由了吧?😅☆18Dec 20, 2021Updated 4 years ago
- StenographyShellcodeLoader☆43Sep 8, 2020Updated 5 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- A golang package for converting to spreadsheet column alphabet or integer☆10Oct 19, 2025Updated 4 months ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆11May 10, 2022Updated 3 years ago
- ☆12Jun 22, 2021Updated 4 years ago