Various shell code I have written
☆17Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below
Sorting:
- Security focused tool for dumping information from Active Directory via LDAP☆19Dec 2, 2024Updated last year
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- 各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC ,该项目将持续更新☆13Mar 4, 2024Updated last year
- BitTorrent DHT Protocol && DHT Spider,faster than shiyanhui/dht☆12Aug 30, 2023Updated 2 years ago
- auto MITM attack tools☆13Oct 11, 2023Updated 2 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- ☆17Mar 6, 2023Updated 2 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 2 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- 分支出了些问题,无法合并到main,迁移至https://github.com/hktalent/scan4all☆17Dec 18, 2023Updated 2 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- Reflective DLL injection Execution☆20Sep 9, 2022Updated 3 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆40Jan 29, 2026Updated last month
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go☆18Jun 1, 2022Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Feb 14, 2020Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- ☆13May 24, 2023Updated 2 years ago
- use shellcode as asm function☆23Mar 29, 2022Updated 3 years ago
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- Breaking the security of Microsoft's RMS☆56Aug 5, 2019Updated 6 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- mindmap created for tools can be used during analysis/investigation☆28Jan 4, 2017Updated 9 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 6 years ago
- desktop screenshot☆29Apr 26, 2023Updated 2 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- Process Injection: APC Injection☆32Jan 13, 2021Updated 5 years ago