shellcode生成框架
☆90Jul 11, 2024Updated last year
Alternatives and similar repositories for obj2shellcode
Users that are interested in obj2shellcode are comparing it to the libraries listed below
Sorting:
- 通杀检测基于白文件patch黑代码的免杀技术的后门☆181Aug 3, 2024Updated last year
- 使用Visral Studio开发ShellCode☆236Oct 11, 2023Updated 2 years ago
- tsh多终端代理通信☆19Feb 26, 2025Updated last year
- Process injection alternative☆407Sep 6, 2024Updated last year
- beta☆119Sep 24, 2024Updated last year
- Bypass LSA protection using the BYODLL technique☆172Sep 21, 2024Updated last year
- 重构Beacon☆165Aug 19, 2024Updated last year
- Beacon Debugger☆55Oct 28, 2024Updated last year
- Beacon compiled using clang☆71Jan 22, 2023Updated 3 years ago
- 一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.☆563May 30, 2025Updated 9 months ago
- ☆18Nov 23, 2023Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆559Apr 8, 2025Updated 11 months ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆301Jul 31, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆436Dec 21, 2023Updated 2 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆170May 17, 2023Updated 2 years ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Apr 29, 2024Updated last year
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆228Sep 19, 2025Updated 6 months ago
- ☆108Aug 21, 2024Updated last year
- CobaltStrike beacon in rust☆208Aug 10, 2024Updated last year
- A BOF that runs unmanaged PEs inline☆683Oct 23, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- Binary Hollowing☆95Sep 10, 2024Updated last year
- Syscall免杀☆511Jun 21, 2024Updated last year
- 添加计划任务方法集合☆310Aug 6, 2023Updated 2 years ago
- ☆147Oct 29, 2024Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆133May 17, 2023Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- shellcode 生成框架☆289Mar 23, 2022Updated 3 years ago
- 钓鱼上线后渗透工具☆131Feb 19, 2023Updated 3 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆542Feb 13, 2024Updated 2 years ago
- 寻找可利用的白文件☆558Aug 18, 2025Updated 7 months ago
- 使用 rust 实现 CobaltStrike 的 beacon || Using Rust to implement CobaltStrike's Beacon☆201Jul 5, 2025Updated 8 months ago
- 制作 shellcode 的模板☆32Oct 30, 2024Updated last year
- A simple Sleepmask BOF example☆171Nov 24, 2025Updated 3 months ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆199May 29, 2025Updated 9 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆326Apr 12, 2024Updated last year