Batch script to compile a binary shellcode blob into an exe file
☆90Jul 12, 2019Updated 6 years ago
Alternatives and similar repositories for shellcode2exe
Users that are interested in shellcode2exe are comparing it to the libraries listed below
Sorting:
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆627May 23, 2023Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 11 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- HashDB API hash lookup plugin for IDA Pro☆354Mar 12, 2026Updated last week
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Feb 15, 2022Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆797Sep 13, 2025Updated 6 months ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- ☆182Apr 24, 2025Updated 10 months ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- ☆29May 10, 2020Updated 5 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- Debug Child Process Tool (auto attach)☆322Aug 11, 2023Updated 2 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- Simplifier vmp ultra☆20Dec 9, 2023Updated 2 years ago
- Fuzzy search tool for IDA Pro (Update)☆12Mar 18, 2024Updated 2 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- A Windows C++ OLE/COM Object explorer written in WTL.☆16Feb 28, 2025Updated last year
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 10 months ago
- XOR decrypting shellcode using the GPU with OpenCL.☆121May 22, 2025Updated 9 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆856Feb 2, 2024Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 7 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,923Updated this week
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- OSED course preparation materials.☆15May 27, 2021Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago