nixpal / shellsiloLinks
SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning variables, and making system calls. With this tool, integrating strings into your shellcode and initializing Unicode strings has never been easier.
☆153Updated 4 months ago
Alternatives and similar repositories for shellsilo
Users that are interested in shellsilo are comparing it to the libraries listed below
Sorting:
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆214Updated last year
- Port of Cobalt Strike's Process Inject Kit☆190Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆182Updated 9 months ago
- Stage 0☆168Updated last year
- Adversary Emulation Framework☆128Updated 6 months ago
- ☆198Updated 9 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- ☆186Updated 6 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆205Updated 2 years ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆249Updated this week
- Local & remote Windows DLL Proxying☆169Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Updated last year
- Ghosting-AMSI☆219Updated 8 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Updated 10 months ago
- ☆159Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆100Updated 8 months ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆177Updated last week
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆151Updated 9 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- Evasive Payload Delivery Server & C2 Redirector☆112Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated last month
- A Mythic agent for Windows written in C☆144Updated this week
- ☆139Updated last month
- Weaponizing DCOM for NTLM Authentication Coercions☆181Updated last month
- Shaco is a linux agent for havoc☆168Updated 2 years ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆212Updated last month