zerosum0x0-archive / archiveLinks
☆57Updated 4 years ago
Alternatives and similar repositories for archive
Users that are interested in archive are comparing it to the libraries listed below
Sorting:
- This is a simple example of DLL hijacking enabling proxy execution.☆67Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Windows internals and exploitation tricks☆110Updated last month
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- It's pointy and it hurts!☆126Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆69Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆70Updated 6 months ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- ☆37Updated 9 months ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- code for the Proxy DLL example blog post☆62Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆132Updated 4 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆40Updated 4 years ago
- ☆33Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- ☆27Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Random CVEs☆34Updated 7 months ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆85Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago