Execute ShellCode / "Inline-Assembler" in Python
☆43Jan 3, 2017Updated 9 years ago
Alternatives and similar repositories for PyShellCode
Users that are interested in PyShellCode are comparing it to the libraries listed below
Sorting:
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Network hacking tools written in Python☆12Dec 23, 2018Updated 7 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- ☆15May 26, 2021Updated 4 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- ☆37Aug 18, 2019Updated 6 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- This repository contains Ansible scripts which will install and configure tools necessary to effectively debug and profile applications o…☆21Jul 14, 2022Updated 3 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- Payment processors for Bitcoin, Ethereum, Ethereum Classic, and Cashapp. They are setup as functions for easy plugin/use.☆20Aug 22, 2022Updated 3 years ago
- A simple tool for detecting memory modifications to Windows API.☆23Jan 9, 2025Updated last year
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago