stephenbradshaw / shellcodeLinks
Various shell code I have written
☆17Updated 5 years ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below
Sorting:
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Updated 5 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- ☆24Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 7 years ago
- A collection of my presentation materials.☆17Updated last year
- ☆48Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆53Updated 4 years ago
- Registry hive parsing the async way☆22Updated last month
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- AMSI detection PoC☆31Updated 5 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- ☆17Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 6 years ago
- ☆16Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago