Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack shellcode
attack
x
shellcode
x
12 search results found
Unicorn
⭐
3,583
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
Thug
⭐
941
Python low-interaction honeyclient
Functionstomping
⭐
643
A new shellcode injection technique. Given as C++ header, standalone Rust program or library.
Byeintegrity Uac
⭐
143
Bypass UAC by hijacking a DLL located in the Native Image Cache
Compsecattacklabs
⭐
107
Contains Attack labs
Maliciousdllgenerator
⭐
86
DLL Generator for side loading attack
Lilac_2020_summer_pwn
⭐
65
Lilac 2020暑期pwn培训课件以及相关文件
Buffer Overflow Attack
⭐
46
This is an example buffer overflow attack on a small vulnerable C program.
Mem64
⭐
19
Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.
Learn To Pwn
⭐
12
learn to do pwn
Buffer Overflow Attack Adventure
⭐
10
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
Pwn Cheatsheet
⭐
8
CTF pwnable cheatsheet
Related Searches
Python Attack (2,303)
Javascript Attack (693)
Attack Adversarial (590)
Security Attack (533)
C Attack (491)
Java Attack (408)
Python Shellcode (238)
C Shellcode (181)
Exploitation Shellcode (127)
Assembly Shellcode (111)
1-12 of 12 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.