nixpal / shellsilo
SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning variables, and making system calls. With this tool, integrating strings into your shellcode and initializing Unicode strings has never been easier.
☆132Updated 5 months ago
Alternatives and similar repositories for shellsilo:
Users that are interested in shellsilo are comparing it to the libraries listed below
- Stage 0☆156Updated 4 months ago
- Port of Cobalt Strike's Process Inject Kit☆173Updated 4 months ago
- Adversary Emulation Framework☆98Updated 9 months ago
- ☆179Updated 3 weeks ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 9 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆198Updated 6 months ago
- ☆106Updated 2 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆155Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆88Updated this week
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆120Updated 6 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆136Updated 3 weeks ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated 3 weeks ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆140Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆163Updated 4 months ago
- Lateral Movement☆122Updated last year
- A Mythic agent for Windows written in C☆119Updated this week
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆146Updated 11 months ago
- Local & remote Windows DLL Proxying☆164Updated 10 months ago
- Windows Persistence IT-Security☆97Updated last month
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆177Updated 2 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆128Updated 4 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆187Updated 4 months ago
- ☆154Updated 4 months ago
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆91Updated last week
- ☆153Updated 8 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆123Updated last week
- ☆125Updated 7 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆148Updated 7 months ago