nixpal / shellsiloLinks
SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning variables, and making system calls. With this tool, integrating strings into your shellcode and initializing Unicode strings has never been easier.
☆138Updated 2 weeks ago
Alternatives and similar repositories for shellsilo
Users that are interested in shellsilo are comparing it to the libraries listed below
Sorting:
- Adversary Emulation Framework☆123Updated last month
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆207Updated 10 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆174Updated 5 months ago
- Stage 0☆163Updated 8 months ago
- Local & remote Windows DLL Proxying☆165Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆192Updated 8 months ago
- ☆191Updated 4 months ago
- Port of Cobalt Strike's Process Inject Kit☆184Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆205Updated last year
- ☆182Updated 2 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆187Updated 6 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆160Updated last month
- ☆145Updated 3 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- ☆191Updated last year
- Evasive Payload Delivery Server & C2 Redirector☆71Updated 2 weeks ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆138Updated 4 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆206Updated last week
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆330Updated last month
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 7 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆153Updated 3 weeks ago
- Ghosting-AMSI☆211Updated 4 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 10 months ago
- ☆157Updated 8 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆193Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 3 months ago