therealdreg / shellex
C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
☆115Updated last year
Alternatives and similar repositories for shellex:
Users that are interested in shellex are comparing it to the libraries listed below
- Assembly block for hooking windows API functions.☆87Updated 5 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆105Updated 4 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆103Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- ☆190Updated 2 years ago
- ☆191Updated 3 years ago
- Windows LPE exploit for CVE-2022-37969☆132Updated last year
- A small PoC that creates processes in Windows☆175Updated 8 months ago
- Silence EDRs by removing kernel callbacks☆228Updated 4 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆160Updated 3 years ago
- ☆112Updated 2 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆203Updated 2 years ago
- Collection of DLL function export forwards for DLL export function proxying☆93Updated last year
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆163Updated 2 years ago
- GhostWriting Injection Technique.☆166Updated 6 years ago
- ☆72Updated 7 years ago
- Example code for EDR bypassing☆150Updated 5 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆46Updated 9 months ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆155Updated 4 years ago
- With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger☆39Updated last year
- Convert PE files to a shellcode☆74Updated 4 years ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 5 years ago
- From directory deletion to SYSTEM shell☆109Updated 4 years ago
- Windows API Call Obfuscation☆99Updated 2 years ago
- Windows API Hashes used in the malwares☆41Updated 9 years ago
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆64Updated 2 years ago
- Shellcode to load an appended Dll☆88Updated 4 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆69Updated 3 years ago