aouto startup remote controle virus example for edu only
-
Updated
May 29, 2024 - C++
A shell is a text-based terminal, used for manipulating programs and files. Shell scripts typically manage program execution.
aouto startup remote controle virus example for edu only
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
A C/C++ project designed to simplify shellcode creation on any compilers using pure C
Python low-interaction honeyclient
Scripts, POCs & more
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
CTF framework and exploit development library
This repo educates developers about BOF vulnerabilities and provides practical solutions to prevent these risks. It equips developers with knowledge and tools to counter one of the most common security vulnerabilities.
D3vN3x-Crypter
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
Windows x86_64bit shellcode written in Nasm
A command line payload injector for 32 & 64 bit Windows applications.
This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypass security measures and upload files in a hidden manner. In the following, the technical details of the code and the techniques used will be explained.
Find&Call Windows API by hash+key.
CTF-type challenge, focused on binary exploitation