Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
-
Updated
May 27, 2024 - C++
A shell is a text-based terminal, used for manipulating programs and files. Shell scripts typically manage program execution.
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
A C/C++ project designed to simplify shellcode creation on any compilers using pure C
Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
CTF framework and exploit development library
Python low-interaction honeyclient
This repo educates developers about BOF vulnerabilities and provides practical solutions to prevent these risks. It equips developers with knowledge and tools to counter one of the most common security vulnerabilities.
D3vN3x-Crypter
aouto startup remote controle virus example for edu only
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
Windows x86_64bit shellcode written in Nasm
A command line payload injector for 32 & 64 bit Windows applications.
This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypass security measures and upload files in a hidden manner. In the following, the technical details of the code and the techniques used will be explained.
Find&Call Windows API by hash+key.
CTF-type challenge, focused on binary exploitation
Scripts, POCs & more
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.