TheBhTiNjector is a filebinder that can concatenate two or more files of some extensions that preserves the integrity of the files and gives you the option of injecting shellcode into them.
-
Updated
Jun 3, 2024 - C++
A shell is a text-based terminal, used for manipulating programs and files. Shell scripts typically manage program execution.
TheBhTiNjector is a filebinder that can concatenate two or more files of some extensions that preserves the integrity of the files and gives you the option of injecting shellcode into them.
CTF framework and exploit development library
Cyber lab to explore different memory exploits and to analyze malware
RArAtikTdkA is a modern, c#-based malware with great undetectable techniques
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
Python low-interaction honeyclient
R.I.P. MrAnon/MrAnonTools/MrAnon666. This is free release for all kids who got scammed/ghosted by gentelman mentioned above. Have fun! ^^
aouto startup remote controle virus example for edu only
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
A C/C++ project designed to simplify shellcode creation on any compilers using pure C
Scripts, POCs & more
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
This repo educates developers about BOF vulnerabilities and provides practical solutions to prevent these risks. It equips developers with knowledge and tools to counter one of the most common security vulnerabilities.
D3vN3x-Crypter
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
Windows x86_64bit shellcode written in Nasm
A command line payload injector for 32 & 64 bit Windows applications.
This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypass security measures and upload files in a hidden manner. In the following, the technical details of the code and the techniques used will be explained.