shellcode生成框架
☆90Jul 11, 2024Updated last year
Alternatives and similar repositories for obj2shellcode
Users that are interested in obj2shellcode are comparing it to the libraries listed below
Sorting:
- 通杀检测基于白文件patch黑代码的免杀技术的后门☆181Aug 3, 2024Updated last year
- 使用Visral Studio开发ShellCode☆234Oct 11, 2023Updated 2 years ago
- beta☆120Sep 24, 2024Updated last year
- Process injection alternative☆406Sep 6, 2024Updated last year
- tsh多终端代理通信☆19Feb 26, 2025Updated last year
- Bypass LSA protection using the BYODLL technique☆171Sep 21, 2024Updated last year
- 重构Beacon☆165Aug 19, 2024Updated last year
- 一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.☆561May 30, 2025Updated 8 months ago
- Beacon compiled using clang☆72Jan 22, 2023Updated 3 years ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆226Sep 19, 2025Updated 5 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆297Jul 31, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆433Dec 21, 2023Updated 2 years ago
- Binary Hollowing☆94Sep 10, 2024Updated last year
- Beacon Debugger☆55Oct 28, 2024Updated last year
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆553Apr 8, 2025Updated 10 months ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Apr 29, 2024Updated last year
- Syscall免杀☆511Jun 21, 2024Updated last year
- 制作 shellcode 的模板☆31Oct 30, 2024Updated last year
- 钓鱼上线后渗透工具☆132Feb 19, 2023Updated 3 years ago
- Generic PE loader for fast prototyping evasion techniques☆244Jul 2, 2024Updated last year
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆169May 17, 2023Updated 2 years ago
- 添加计划任务方法集合☆309Aug 6, 2023Updated 2 years ago
- A BOF that runs unmanaged PEs inline