ommadawn46 / win-x86-shellcoder
A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)
☆54Updated 2 years ago
Alternatives and similar repositories for win-x86-shellcoder:
Users that are interested in win-x86-shellcoder are comparing it to the libraries listed below
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- ☆28Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆90Updated 2 years ago
- Simple BOF to read the protection level of a process☆114Updated last year
- ☆139Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆79Updated 3 years ago
- Local & remote Windows DLL Proxying☆161Updated 8 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆96Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Create Anti-Copy DRM Malware☆52Updated 6 months ago
- ☆88Updated 2 years ago
- AV/EDR evasion via direct system calls.☆107Updated last year
- SeManageVolumePrivilege to SYSTEM☆89Updated last year
- PoCs of RCEs against open source C2 servers☆79Updated 5 months ago
- ☆61Updated 2 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆45Updated last year
- A variety of AV evasion techniques written in C# for practice.☆84Updated 3 years ago
- ☆19Updated 3 years ago
- ☆45Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Port of Cobalt Strike's Process Inject Kit☆167Updated 3 months ago
- Code dump from PEN-300/OSEP updated 2022☆40Updated 2 years ago
- ☆95Updated last year
- SeRestorePrivilege to SYSTEM☆91Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- Tools/scripts I used/developed during the EXP-301 course.☆18Updated 2 years ago
- Adversary Emulation Framework☆87Updated 7 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago