Building optimized shellcode using GCC. Suited for learning assembly and playing with the ABI
☆78May 16, 2018Updated 7 years ago
Alternatives and similar repositories for shellcc
Users that are interested in shellcc are comparing it to the libraries listed below
Sorting:
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- External C2 Using IE COM Objects☆100Feb 24, 2019Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- ☆68Nov 15, 2022Updated 3 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- load macho files in memory without touching the Disk☆44Sep 16, 2022Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Virtual File System supporting Different Functions (adding , copying from and to Hard Disk , Deleting Files and Folders)☆11Jul 13, 2017Updated 8 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Tiny loaders for various binary formats.☆246May 4, 2016Updated 9 years ago
- ☆15May 26, 2021Updated 4 years ago
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Sustainable shellcode evasion☆113Dec 11, 2024Updated last year
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆32Dec 18, 2020Updated 5 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Legacy Tweak☆12Feb 6, 2023Updated 3 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 4 months ago
- ☆34Apr 5, 2017Updated 8 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Cross platform Windows PDB Reader for .NET Core to read windows pdb☆18Mar 14, 2020Updated 6 years ago
- A collection of Browser DOM Vulnerabilities with PoCs☆40Nov 20, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- A GOLD Engine implementation in FPC☆12Aug 12, 2023Updated 2 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- vm -- code interpreter☆25Apr 8, 2019Updated 6 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 8 years ago