vasco2016 / shellsploit-framework
New Generation Exploit Development Kit
☆64Updated 8 years ago
Alternatives and similar repositories for shellsploit-framework:
Users that are interested in shellsploit-framework are comparing it to the libraries listed below
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆109Updated 3 years ago
- Dll Convert to Shellcode.☆41Updated 2 years ago
- No inline asm,support x86/x64☆64Updated 3 years ago
- Win32k Elevation of Privilege Poc☆80Updated 5 years ago
- Small tool to load shellcodes or PEs to analyze them☆81Updated 6 years ago
- PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)☆271Updated 6 years ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆128Updated 6 years ago
- Proof of Concept exploit for CVE-2017-8570☆187Updated 7 years ago
- PoC for CVE-2018-0802 And CVE-2017-11882☆166Updated 7 years ago
- shell over icmp☆31Updated 11 years ago
- All about the remote administrative tools☆35Updated 9 years ago
- CVE20178570☆94Updated 7 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 4 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Updated 7 years ago
- Support x86 and x64☆66Updated 3 years ago
- powershell to hide process by kd.exe☆32Updated 3 years ago
- Use CLR to inject all the .NET apps☆183Updated 3 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 6 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆82Updated 3 years ago
- Small modification version of p0wnedShell☆39Updated 8 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago