therealdreg / xshellex
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
☆38Updated last year
Related projects ⓘ
Alternatives and complementary repositories for xshellex
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆52Updated 8 months ago
- ☆32Updated 3 years ago
- A ready-made template for a project based on libpeconv.☆41Updated last month
- ☆21Updated 3 years ago
- Code Injection technique written in cpp language☆31Updated 6 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆36Updated 2 years ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- ☆22Updated 4 years ago
- This is a simple driver with x64 inline assembly☆53Updated 4 years ago
- x86/x64 dll injector☆29Updated 2 years ago
- PE Library x86☆20Updated 5 years ago
- ☆20Updated 3 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- ☆42Updated last week
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 4 years ago
- c++ implementation of windows heavens gate☆55Updated 3 years ago
- PE file mapping and manipulation package.☆35Updated 2 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆55Updated 5 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- exploit termdd.sys(support kb4499175)☆57Updated 5 years ago
- ☆18Updated 5 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆37Updated 2 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103Updated 4 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆26Updated 3 years ago
- A set of small utilities, helpers for PIN tracers☆31Updated last year
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Updated last year
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆19Updated last year
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago