Skip to content
View snovvcrash's full-sized avatar
💭
Thinking in graphs
💭
Thinking in graphs

Block or report snovvcrash

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
13 stars written in Assembly
Clear filter

File formats dissections and more...

Assembly 11,429 793 Updated Feb 18, 2024

AV/EDR evasion via direct system calls.

Assembly 2,002 275 Updated Jan 1, 2023

AV/EDR evasion via direct system calls.

Assembly 1,809 263 Updated Sep 3, 2022

Template-Driven AV/EDR Evasion Framework

Assembly 1,790 279 Updated Nov 3, 2023

A C2 post-exploitation framework

Assembly 486 73 Updated Jan 24, 2024

A small, null-free Windows shellcode that executes calc.exe (x86/x64, all OS/SPs)

Assembly 445 90 Updated May 21, 2024

Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)

Assembly 320 42 Updated Nov 9, 2021

A technique of hiding malicious shellcode via Shannon encoding.

Assembly 268 33 Updated Oct 23, 2022

A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.

Assembly 167 20 Updated Sep 10, 2021

64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.

Assembly 132 37 Updated Mar 8, 2023

A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.

Assembly 72 6 Updated Mar 6, 2024

64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free

Assembly 65 10 Updated Mar 8, 2023

64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"

Assembly 39 26 Updated May 3, 2021