Git Product home page Git Product logo

APKC's Projects

shellcode-plain-sight icon shellcode-plain-sight

Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak

shellcodefluctuation icon shellcodefluctuation

An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

shellcodeloader icon shellcodeloader

该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用

shellcodestdio icon shellcodestdio

An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.

shellcrypt icon shellcrypt

A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.

shellghost icon shellghost

A memory-based evasion technique which makes shellcode invisible from process start to end.

shells icon shells

List of payloads: reverse shell, bind shell, webshell.

shelltropy icon shelltropy

A technique of hiding malicious shellcode via Shannon encoding.

sherlock icon sherlock

PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.

sigthief icon sigthief

Stealing Signatures and Making One Invalid Signature at a Time

silenthound icon silenthound

Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.

simpleedr icon simpleedr

Simple EDR that injects a DLL into a process to place a hook on specific Windows API

skcrypter icon skcrypter

Compile-time, Usermode + Kernelmode, safe and lightweight string crypter library for C++11+

skyhook icon skyhook

A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.

slient-doc-pdf-exploit-builder-fud-malware-cve icon slient-doc-pdf-exploit-builder-fud-malware-cve

One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted

slinkycat icon slinkycat

Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET queries which can be used to enumerate a Windows domain.

slip icon slip

Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z, jar, war, apk and ipa archives.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.