125 skills found · Page 4 of 5
KiExitDispatcher / Evilbytecode Shellcode Go TacticsA mutliple tactics to execute shellcode in go :}
carved4 / Go CrypterA cryptographic payload loader and executor designed for advanced in-memory execution techniques. This project combines strong encryption, compression, and sophisticated evasion capabilities to execute both shellcode and PE files directly in memory.
HackingThings / SuperSneakyExecLoading and executing shellcode in C# without PInvoke.
Zeyad-Azima / ShellcodeGenZGenZ Shellcode Generator to execute commands with winExec API
rmadair / PE InjectorInject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellcode will be executed, then return control flow to the original entry point of the program. Perhaps a nice way to maintain persistence? Check out the README for full details.
blinkenl1ghts / DonloaderdonLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.
VirtualAlllocEx / Create Thread Inline Assembly X86This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly
x0reaxeax / SilentWritePoC arbitrary WPM without a process handle
Neetx / Shellcode ExtractorPython script to extract shellcode from object/executable files
mobdk / SigmaExecute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx
ciccio-87 / Python AV EvasionExecute shellcode and evade AV detection with python.
DragoQCC / ShellcodeEncryptionUsed to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellcode.
SanderDemeester / Evil SysreadEvil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.
LiadAvramov / Vmt HookingVMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when the process calls a virtual function and fetches the function pointer to be called, it will eventually execute your code. In this example, I've create a buggy application that suffers from a data leak vulnerability, if exploited correctly, leaking the target class this pointer and allow this technique to work. I use meterpreter shellcode as my hook function opcodes.
sinmygit / RogueMMCExecute Shellcode And Other Goodies From MMC
momo1239 / Buffshark Shellcode RunnerShellcode runner to execute malicious payload and bypass AV
kensh1ro / Dart ShellcodeA PoC executing shellcode in Dart
Pwn3rx0 / Anubis LoaderShellcode loader that hides payload within Egyptian hieroglyphic Unicode characters (U+13000 plane) to evade detection. It decodes the glyphs at runtime and executes in memory.
Kara-4search / APC ShellcodeExecution CSharpShellcode Load or execute via "APC technic"
TartarusLabs / ExpeditusExpeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to do this with some level of stealth.