nixpal / shellsiloLinks
SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning variables, and making system calls. With this tool, integrating strings into your shellcode and initializing Unicode strings has never been easier.
☆152Updated 3 months ago
Alternatives and similar repositories for shellsilo
Users that are interested in shellsilo are comparing it to the libraries listed below
Sorting:
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆209Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆174Updated 8 months ago
- Stage 0☆164Updated 11 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated 11 months ago
- Port of Cobalt Strike's Process Inject Kit☆188Updated 11 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Adversary Emulation Framework☆126Updated 4 months ago
- Local & remote Windows DLL Proxying☆169Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆159Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Updated 9 months ago
- ☆159Updated 11 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆151Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆198Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- Evasive Payload Delivery Server & C2 Redirector☆111Updated 2 weeks ago
- ☆185Updated 5 months ago
- ☆196Updated 7 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆366Updated 4 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 7 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆187Updated 6 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 10 months ago
- A Mythic agent for Windows written in C☆140Updated this week
- Extracting NetNTLM without touching lsass.exe☆239Updated last year
- Ghosting-AMSI☆220Updated 6 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆98Updated 6 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆228Updated 9 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆262Updated 7 months ago