125 skills found · Page 3 of 5
BronzeTicket / ClipboardWindow InjectCLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback
JayGLXR / NomadLoaderAn advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables executable content to be executed from any memory location without requiring traditional loading or relocation.
zeroaceee / EDMapperA documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.
tijme / Kong LoaderUsing Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible in memory.
whokilleddb / ASPxecuteExecute shellcode via ASPNET compiler
RixedLabs / IDLE AbuseA method to execute shellcode using RegisterWaitForInputIdle API.
NYAN-x-CAT / SharpShellInjecting shellcode into a process memory and executing it in C#
MaorSabag / Interactive Execute ShellcodeA simple PoC of injection shellcode into a remote process and get the output using namepipe
mobdk / CoreCore bypass Windows Defender and execute any binary converted to shellcode
thomaskeck / PyShellCodeExecute ShellCode / "Inline-Assembler" in Python
djackreuter / BtexecExecute shellcode via Bluetooth device authentication
hexsecteam / Clematis GUIConvert any executable (RAT, keylogger, botnet, meterpreter, anything) into raw shellcode and run it stealthily from memory using a custom C++ loader.
nullsection / Sneaky DLL StagerReasonably undetected shellcode stager and executer.
thefLink / MemfiddlerExecutes shellcode from a remote server and aims to evade in-memory scanners
OsandaMalith / CallbackShellcodeExecuting Shellcode with ReadDirectoryChanges’s Hidden Callback
Kara-4search / Fiber ShellcodeExecutionUsing fibers to execute shellcode in a local process via csharp
rkbennett / Pyobject Injectexecuting shellcode directly from a python variable
ldsaiyan / EventLogPersistA Simple Proof Code for Extracting and Executing Shellcode from Event Logs
ProcessusT / CobaltStrikeBypassDefenderA launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique
Broihon / StartRoutineA library with four different methods to execute shellcode in a process