nixpal / shellsilo
SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning variables, and making system calls. With this tool, integrating strings into your shellcode and initializing Unicode strings has never been easier.
☆129Updated 4 months ago
Alternatives and similar repositories for shellsilo:
Users that are interested in shellsilo are comparing it to the libraries listed below
- Stage 0☆154Updated 3 months ago
- Adversary Emulation Framework☆96Updated 8 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆150Updated 2 weeks ago
- Lateral Movement☆122Updated last year
- Port of Cobalt Strike's Process Inject Kit☆171Updated 4 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 11 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆118Updated 5 months ago
- ☆158Updated this week
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- Windows Persistence IT-Security☆93Updated 3 weeks ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆127Updated 3 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆133Updated last week
- ☆148Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆160Updated 3 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆118Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 10 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆111Updated this week
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 8 months ago
- A Mythic agent for Windows written in C☆104Updated this week
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆184Updated 4 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆184Updated last year
- ☆197Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆113Updated 7 months ago
- ☆104Updated last month
- ☆152Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆171Updated last month