secretsquirrel / shellcode_retriever
POC of code that downloads and executes shellcode in memory.
☆80Updated 10 years ago
Alternatives and similar repositories for shellcode_retriever:
Users that are interested in shellcode_retriever are comparing it to the libraries listed below
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 6 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- ☆34Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- VBS Reversed TCP Meterpreter Stager☆86Updated 7 years ago
- A sample bot for Cobalt Strike 3☆22Updated 8 years ago
- Projects and POCs☆59Updated 10 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 7 years ago
- some pocs for antivirus evasion☆129Updated last year
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Slides from previous conference talks☆41Updated 7 years ago
- ☆53Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆68Updated 10 years ago
- ☆84Updated 9 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- InfoPath Phishing Repo Resource☆69Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Offensive Data Storage☆58Updated 8 years ago
- Custom stagers with python encrypting proxy☆40Updated 9 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago
- ☆58Updated 7 years ago
- Listening Post for Throwback Implant☆110Updated 9 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago