therealdreg / shellexLinks
C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
☆116Updated last year
Alternatives and similar repositories for shellex
Users that are interested in shellex are comparing it to the libraries listed below
Sorting:
- Assembly block for hooking windows API functions.☆92Updated 5 years ago
- ☆199Updated 4 years ago
- GhostWriting Injection Technique.☆175Updated 7 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆225Updated 4 years ago
- A small PoC that creates processes in Windows☆182Updated last year
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆105Updated 4 years ago
- PoC MSVC COFF Object file loader/injector.☆177Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- ☆200Updated 3 years ago
- Windows API Hashes used in the malwares☆41Updated 9 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆92Updated 4 years ago
- Silence EDRs by removing kernel callbacks☆234Updated 4 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 4 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆154Updated 4 years ago
- Enabled / Disable LSA Protection via BYOVD☆68Updated 3 years ago
- With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger☆39Updated last year
- Convert PE files to a shellcode☆76Updated 5 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- ☆165Updated 3 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆106Updated 4 years ago
- shellcode-loaders and beacon-loaders☆64Updated last year
- Reverse engineered source code of the autochk rootkit☆202Updated 5 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆54Updated 3 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆217Updated 2 years ago
- Example code for EDR bypassing☆150Updated 6 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆225Updated last year
- ☆72Updated 3 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆163Updated 2 years ago