The Wayback Machine - https://web.archive.org/web/20220505122423/https://github.com/topics/shellcode-injection
Here are
36 public repositories
matching this topic...
Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace
Updated
Jan 19, 2021
Python
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
Updated
Sep 23, 2020
Python
Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL
A feature rich DLL injection library.
Updated
Feb 10, 2022
Python
PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including 400+Tools and 350+posts
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Updated
Sep 9, 2021
Python
Nim implementation of Process Hollowing using syscalls (PoC)
Resources About Shellcode
Advanced Malware with multifeatures written in ASM/C/C++ , work on all windows versions !
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
HatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Updated
Apr 27, 2022
Python
FUD metasploit Persistence RAT
Updated
Mar 30, 2022
Python
Simple shellcode obfuscator using PYTHON and C / C++
Volatile ELF payloads generator with Metasploit integrations for testing GNU/Linux ecosystems
PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible
Updated
Nov 24, 2019
Python
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
A tool to parse and load module in memory, as well as attach a DLL in EXE. Most of the functions are inline, so that it can also be used in shellcode.
A library with four different methods to execute shellcode in a process
Shellcode Load or execute via "APC technic"
Manual map shellcode (aka byte array) injector
A collection of offensive Go packages inspired by different Go repositories.
💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.
Updated
Oct 1, 2019
Python
Collection of shellcode injection and execution techniques
drx ptrace shellcode injector
Various Process Injection Techniques
A server for testing shellcode injection over a buffer overflow
PoCs for local and remote shellcode injection using C# and the Win32 API.
Updated
Sep 19, 2021
PowerShell
Improve this page
Add a description, image, and links to the
shellcode-injection
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
shellcode-injection
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
First of all, thanks for your work and publishing it along with the very interesting blog post.
I've been playing a bit with your POC, especially the Rust version, and there is something I'm not fully getting. Depending on the victim process, I get the following results: