POC of code that downloads and executes shellcode in memory.
☆80May 25, 2014Updated 11 years ago
Alternatives and similar repositories for shellcode_retriever
Users that are interested in shellcode_retriever are comparing it to the libraries listed below
Sorting:
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- Covert Channels for C2 Server☆17Oct 2, 2015Updated 10 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Oct 30, 2013Updated 12 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- Some exploits and exploit development stuff.☆153Feb 19, 2022Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Cartero - Social Engineering Framework☆176Mar 8, 2026Updated last week
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Jun 27, 2017Updated 8 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆49Mar 8, 2026Updated last week
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- A "tiny" meterpreter stager☆127Aug 20, 2019Updated 6 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Jul 2, 2020Updated 5 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Sep 15, 2015Updated 10 years ago
- Script to execute in memory a sequence of opcodes☆416Jun 23, 2014Updated 11 years ago
- Binary resource copier☆99Apr 14, 2025Updated 11 months ago
- ☆108Jul 18, 2017Updated 8 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago