Shellcodes database for study cases

Hacking
Mainframes: structure and features of penetration testing | Securelist
We explain how mainframes work, potential attack vectors, and what to focus on when pentesting such systems.
foorilla/allinfosecnews_sources: A list of online news & info sources in the InfoSec/Cybersecurity space
A list of online news & info sources in the InfoSec/Cybersecurity space - foorilla/allinfosecnews_sources
deepinstinct/ShimMe
Malware development part 1 - basics – 0xPat blog – Red/purple teamer
Introduction This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist. Let’s create a C++ application that will run malicious shellcode while trying to not be caught by AV software. Why C++ and not C# or PowerShell script? Because it’s much more difficult to analyze compiled binary when compared to managed code or script. For the purpose of this and following articles we will use MS Visual Studio 2017 or 2019 on Windows 10.
Hiding in plain sight (part 2) - Abusing the dynamic linker
A stealthy process stomping method compatible with UNIX-like systems with anti-forensic enhancements for Linux.
Injecting Java in-memory payloads for post-exploitation
Process Injection is Dead. Long Live IHxHelpPaneServer | by CICADA8 | Jul, 2024 | Medium
Process Injection without Process Injection. Exploring cross-session activation mechanisms to steal someone else’s session using COM
Introducing Nyxstone: An LLVM-based (Dis)assembly Framework - Emproof
At Emproof, our mission is to enhance the security and integrity of embedded systems through innovative binary rewriting techniques. We are committed to providing advanced […]
grimresource.msc · GitHub
grimresource.msc · GitHub
sokaRepo/CoercedPotatoRDLL: Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege
Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege - sokaRepo/CoercedPotatoRDLL
Assembly for Hackers
Getting SYSTEM – Decoder's Blog
In your red teaming or pentesting activities escalating to SYSTEM on a Windows box is always the desired objective. The SYSTEM user is a special operating system user with the highest privilege, m…
How I hacked smart lights: the story behind CVE-2022-47758
Introduction In this blogpost, we take a closer look at our research regarding CVE-2022-47758: a critical vulnerability impacting a very large number of Internet of Things smart devices. We could leverage this vulnerability in the lamp's firmware for unauthenticated remote code execution on the entire device with the highest privileges
GunshipPenguin/kiteshield: Packer/Protector for x86-64 ELF binaries on Linux
Packer/Protector for x86-64 ELF binaries on Linux.
Diverto/IPPrintC2: PoC for using MS Windows printers for persistence / command and control via Internet Printing
PoC for using MS Windows printers for persistence / command and control via Internet Printing - Diverto/IPPrintC2
Persistence Techniques That Persist
Abstract Once threat actors gain a foothold on a system, they must implement techniques to maintain that access, even in the event of restarts, updates in credentials or any other type of change...
Helixo32/CrimsonEDR: Simulate the behavior of AV/EDR for malware development training.
Simulate the behavior of AV/EDR for malware development training. - Helixo32/CrimsonEDR
DosX-dev/obfus.h: Macro-header for compile-time C obfuscation (tcc, win x86/x64)
Macro-header for compile-time C obfuscation (tcc, win x86/x64) - DosX-dev/obfus.h
fortra/nanodump: The swiss army knife of LSASS dumping
The swiss army knife of LSASS dumping. Contribute to fortra/nanodump development by creating an account on GitHub.
Notselwyn/CVE-2024-1086: Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9...
jpillora/chisel: A fast TCP/UDP tunnel over HTTP
A fast TCP/UDP tunnel over HTTP. Contribute to jpillora/chisel development by creating an account on GitHub.
jstrosch/sclauncher: A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.
A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode. - jstrosch/sclauncher
Sh3lldon/FullBypass: A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. Feel free to modiy and DM if you find some bugs :)
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. Feel free to modiy and DM if you find s...
Xre0uS/MultiDump: MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.
MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly. - GitHub - Xre0uS/MultiDump: MultiDump is a post-exploitation tool for dumping and extracting LSASS memory ...
Drakiat/RedTeam-Checker: An automation to monitor if backdoors/default settings are still active on the compromised machines over time.
An automation to monitor if backdoors/default settings are still active on the compromised machines over time. - GitHub - Drakiat/RedTeam-Checker: An automation to monitor if backdoors/default set...
PeCoReT/pecoret: A Pentest Collaboration and Reporting Tool
A Pentest Collaboration and Reporting Tool. Contribute to PeCoReT/pecoret development by creating an account on GitHub.
factionsecurity/faction
Pen Test Report Generation and Assessment Collaboration
Cracked5pider/Stardust: An modern 64-bit position independent implant template
An modern 64-bit position independent implant template
SafeBreach-Labs/PoolParty: A set of fully-undetectable process injection techniques abusing Windows Thread Pools
A set of fully-undetectable process injection techniques abusing Windows Thread Pools - GitHub - SafeBreach-Labs/PoolParty: A set of fully-undetectable process injection techniques abusing Windows ...