Position Independent Windows Shellcode Written in C
☆297Aug 28, 2018Updated 7 years ago
Alternatives and similar repositories for PIC_Bindshell
Users that are interested in PIC_Bindshell are comparing it to the libraries listed below
Sorting:
- 使用纯C/C++编写的ShellCode生成框架☆452May 25, 2019Updated 6 years ago
- Rapid generation ShellCode☆60Sep 12, 2017Updated 8 years ago
- ☆147Oct 1, 2020Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,503Nov 15, 2023Updated 2 years ago
- Fast Conversion Windows Dynamic Link Library To ShellCode☆420Mar 10, 2022Updated 3 years ago
- Shellcode Compiler☆1,149Sep 1, 2024Updated last year
- A PoC WMI backdoor presented at Black Hat 2015☆276Aug 10, 2015Updated 10 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆533Jul 2, 2025Updated 8 months ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- Universal Unhooking☆326Sep 19, 2018Updated 7 years ago
- shellcode注入测试工具☆52Aug 5, 2019Updated 6 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆341Jul 30, 2017Updated 8 years ago
- Easily define in-memory enums, structs, and Win32 functions in PowerShell☆228Oct 14, 2018Updated 7 years ago
- 加载内存当中的DLL文件☆83Aug 1, 2018Updated 7 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆233Mar 18, 2024Updated last year
- Converts PE into a shellcode☆2,745Aug 30, 2025Updated 6 months ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,231Sep 3, 2022Updated 3 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Obfuscate specific windows apis with different apis☆1,023Feb 21, 2021Updated 5 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆158Jun 10, 2019Updated 6 years ago
- win32下的虚拟机保护壳☆145Nov 27, 2014Updated 11 years ago
- GUI Application in C# to run and disassemble shellcode☆36Aug 3, 2017Updated 8 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆101Jan 7, 2018Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆893Aug 20, 2021Updated 4 years ago
- X86 version of syswhispers2 / x86 direct system call☆330Jan 28, 2021Updated 5 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Phantom DLL hollowing PoC☆371May 23, 2022Updated 3 years ago
- ☆48Nov 7, 2018Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago