Various shell code I have written
☆17Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below
Sorting:
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- Complete implementation of the EMV contact kernel based on EMV 4.3 specifications☆16Jun 15, 2024Updated last year
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Jul 6, 2019Updated 6 years ago
- T5577 raw writer app for Flipper Zero☆15Feb 4, 2025Updated last year
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 3 months ago
- black Ip lists, dorks-collection☆17Mar 1, 2026Updated 2 weeks ago
- ☆11Dec 26, 2022Updated 3 years ago
- 正确解析 _HEAP_VS_***符号 ,支持在最新win11 24h2 运行,替换windbg自带的!pool命令☆17Nov 30, 2024Updated last year
- A simple tool for enumerating dynamic endpoints on a DCE/RPC remote or local endpoint mapper.☆15Oct 9, 2020Updated 5 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 6 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Mar 11, 2024Updated 2 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- a windows kernel keylogger that works☆20Feb 12, 2024Updated 2 years ago
- Ransomware written in vb.net for eduational purpouses☆13Aug 19, 2016Updated 9 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- BitTorrent DHT Protocol && DHT Spider,faster than shiyanhui/dht☆12Aug 30, 2023Updated 2 years ago
- ☆19Mar 3, 2022Updated 4 years ago
- ☆13Dec 1, 2020Updated 5 years ago
- auto MITM attack tools☆14Oct 11, 2023Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- filter driver to hide files and directories☆25Feb 12, 2024Updated 2 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago