shell code example
☆68Dec 12, 2025Updated 3 months ago
Alternatives and similar repositories for SC
Users that are interested in SC are comparing it to the libraries listed below
Sorting:
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- ☆19Sep 17, 2025Updated 6 months ago
- find dll base addresses without PEB WALK☆162Jul 13, 2025Updated 8 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆126Dec 6, 2024Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 2 months ago
- ☆42Feb 18, 2025Updated last year
- Call Stack Spoofing for Rust☆212Jan 28, 2026Updated last month
- ☆127Jan 23, 2025Updated last year
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 8 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆125Jul 11, 2025Updated 8 months ago
- Finding Truth in the Shadows☆124Jan 26, 2023Updated 3 years ago
- ☆126Sep 1, 2024Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆283Apr 6, 2025Updated 11 months ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆122Sep 8, 2024Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 11 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆21Feb 22, 2025Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- A C DLL that can control powershell☆51Dec 13, 2019Updated 6 years ago
- BOF with Synthetic Stackframe☆233Oct 30, 2025Updated 4 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- ☆128Dec 12, 2025Updated 3 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 4 months ago
- Position-independent Reflective Loader for macOS☆119Feb 19, 2026Updated last month
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- ☆410Dec 8, 2024Updated last year
- ☆153Oct 2, 2023Updated 2 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 2 months ago