#夺旗赛 (CTF) 和网络安全资源# CTF framework and exploit development library
翻译 - CTF框架和漏洞利用开发库
Converts PE into a shellcode
Open-Source Shellcode & PE Packer
翻译 - 在此处阅读博客文章:https://iwantmore.pizza/posts/PEzor.html
Antivirus evasion project
翻译 - 防病毒规避项目
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
翻译 - bddisasm是一种快速,轻量级的x86 / x64指令解码器。该项目还具有一个快速的,基本的x86 / x64指令仿真器,专门设计用于检测类似shellcode的行为。
shellcode免杀加载器,使用go实现,免杀bypass火绒、360、核晶、def等主流杀软
MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash
Evasive shellcode loader for bypassing event-based injection detection (PoC)
翻译 - 逃逸的shellcode加载程序,用于绕过基于事件的注入检测(PoC)
Shellcode injection technique. Given as C++ header, standalone Rust program or library.
翻译 - 一种新的 shellcode 注入技术。作为 C++ 头文件或独立的 Rust 程序给出。
Shoggoth: Asmjit Based Polymorphic Encryptor
#安全# Real fucking shellcode encryptor & obfuscator tool
Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace
翻译 - 在不使用ptrace的情况下将共享库(即任意代码)注入实时linux进程中
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques
翻译 - 对Darkhotel“ Double Star” APT利用链进行个性化/增强的重新创建,重点是Windows 8.1,并结合了我自己的一些技巧
Using Thread Description To Hide Shellcode
翻译 - 使用线程描述隐藏Shellcode
FUD shellcode Injector
翻译 - 注入细胞代码的食物
Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.
翻译 - 通过文件映射加载 ntdll.dll 的新副本以绕过 API 内联挂钩。