soolidsnake / shellcode_encoderLinks
☆12Updated 6 years ago
Alternatives and similar repositories for shellcode_encoder
Users that are interested in shellcode_encoder are comparing it to the libraries listed below
Sorting:
- Antivirus Emulator Fingerprints☆30Updated 7 years ago
- AMSI detection PoC☆31Updated 5 years ago
- ☆45Updated 7 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- ☆24Updated 4 years ago
- ☆36Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 6 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- PoC code from blog☆16Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- Simple shellcode injector.☆13Updated 7 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- Automate AV evasion by calling AMSI☆88Updated 2 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- ☆28Updated 6 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Updated 6 years ago