shell code example
☆67Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for SC
Users that are interested in SC are comparing it to the libraries listed below
Sorting:
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆125Dec 6, 2024Updated last year
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- find dll base addresses without PEB WALK☆157Jul 13, 2025Updated 7 months ago
- ☆21Feb 22, 2025Updated last year
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆121Jul 11, 2025Updated 7 months ago
- ☆126Sep 1, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆281Apr 6, 2025Updated 10 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆122Sep 8, 2024Updated last year
- ☆126Jan 23, 2025Updated last year
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆42Feb 18, 2025Updated last year
- Finding Truth in the Shadows☆123Jan 26, 2023Updated 3 years ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- A C DLL that can control powershell☆51Dec 13, 2019Updated 6 years ago
- ☆152Oct 2, 2023Updated 2 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Call Stack Spoofing for Rust☆210Jan 28, 2026Updated last month
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Position-independent Reflective Loader for macOS☆112Feb 19, 2026Updated last week
- Rust template/library for implementing your own COFF loader☆71Jan 27, 2025Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆281Sep 18, 2024Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆409Jan 11, 2026Updated last month
- ☆19Sep 17, 2025Updated 5 months ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 7 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 10 months ago
- BOF with Synthetic Stackframe☆225Oct 30, 2025Updated 3 months ago
- CreateRemoteThreadPlus: how to pass multiple parameters to the remote thread function without shellcode.☆138Jul 10, 2025Updated 7 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- early cascade injection PoC based on Outflanks blog post☆237Nov 7, 2024Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 6 months ago
- ☆125Dec 12, 2025Updated 2 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆308Mar 31, 2025Updated 10 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆386Sep 26, 2025Updated 5 months ago