A Malware Evasion Techniques, including shellcode generation, syntax modification, anti-dynamic analysis, and PE header modification.
-
Updated
Jun 25, 2024 - C
A shell is a text-based terminal, used for manipulating programs and files. Shell scripts typically manage program execution.
A Malware Evasion Techniques, including shellcode generation, syntax modification, anti-dynamic analysis, and PE header modification.
Code for example Thread-Hijacking method
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
This is a C++ library that can be used to access different information about processes on the windows platform, it also provides you with the capability of executing 64-bit code in Wow64 processes.
A command line payload injector for 32 & 64 bit Windows applications.
CTF-type challenge, focused on binary exploitation
A (quite) simple steganography algorithm to hide shellcodes within bitmap image.
A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust
A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.
A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.
A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.
windows自动监控截图工具。 windows automatic screenshoter.
ShellCode & Exploits Script Base On GHDB.
A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.
Lazy "position independent" payload making technique for Windows
Open-Source Shellcode & PE Packer
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".