- (ノ°∀°)ノ⌒・*:.。. .。.:*・゜゚・*☆
- https://ppn.snovvcra.sh
- @snovvcrash
Stars
- All languages
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- D
- Dockerfile
- Go
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- Pony
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Standard ML
- Swift
- TypeScript
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic .NET
- Vue
- YARA
AV/EDR evasion via direct system calls.
AV/EDR evasion via direct system calls.
Template-Driven AV/EDR Evasion Framework
A small, null-free Windows shellcode that executes calc.exe (x86/x64, all OS/SPs)
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)
A technique of hiding malicious shellcode via Shannon encoding.
A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.
64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.
A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.
64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free
64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"