Building optimized shellcode using GCC. Suited for learning assembly and playing with the ABI
☆78May 16, 2018Updated 7 years ago
Alternatives and similar repositories for shellcc
Users that are interested in shellcc are comparing it to the libraries listed below
Sorting:
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- Virtual File System supporting Different Functions (adding , copying from and to Hard Disk , Deleting Files and Folders)☆11Jul 13, 2017Updated 8 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- Legacy Tweak☆12Feb 6, 2023Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- load macho files in memory without touching the Disk☆43Sep 16, 2022Updated 3 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- IDA Pro плагин для отображения результата Coresight ETM трассировки perf'а☆17Sep 4, 2018Updated 7 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 9 years ago
- Windows Inline function hooking library targeted at MSVC☆27Aug 12, 2016Updated 9 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- ☆68Nov 15, 2022Updated 3 years ago
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year