🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: omni
👤 项目作者: annihilatorq
🛠 开发语言: C++
⭐ Star数量: 235 | 🍴 Fork数量: 22
📅 更新时间: 2026-04-26 14:58:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: omni
👤 项目作者: annihilatorq
🛠 开发语言: C++
⭐ Star数量: 235 | 🍴 Fork数量: 22
📅 更新时间: 2026-04-26 14:58:40
📝 项目描述:
A modern zero-allocation C++23 library for working with low-level Windows within user-space. Iteration over loaded modules via PEB, EAT iteration, lazy imports, syscalls, and more.🔗 点击访问项目地址
GitHub
GitHub - annihilatorq/omni: windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and…
windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and utilities, range-based DLL and export enumeration, wrapper around KUSER_SHARED_DATA. supported com...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: PeDropper
👤 项目作者: maxDcb
🛠 开发语言: C++
⭐ Star数量: 11 | 🍴 Fork数量: 7
📅 更新时间: 2026-04-27 13:58:45
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: PeDropper
👤 项目作者: maxDcb
🛠 开发语言: C++
⭐ Star数量: 11 | 🍴 Fork数量: 7
📅 更新时间: 2026-04-27 13:58:45
📝 项目描述:
Create a Shellcode Dropper from any Windows Module 🔗 点击访问项目地址
GitHub
GitHub - maxDcb/PeDropper: Create a Shellcode Dropper from any Windows Module
Create a Shellcode Dropper from any Windows Module - maxDcb/PeDropper
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: EmuC0re
👤 项目作者: Khandiaz6262
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 00:55:41
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: EmuC0re
👤 项目作者: Khandiaz6262
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 00:55:41
📝 项目描述:
Run PS5 emulators as native x86_64 shellcode via LuaC0re JIT, enabling homebrew apps from userland with NES support up to firmware 13.00🔗 点击访问项目地址
GitHub
GitHub - Khandiaz6262/EmuC0re: Run PS5 emulators as native x86_64 shellcode via LuaC0re JIT, enabling homebrew apps from userland…
Run PS5 emulators as native x86_64 shellcode via LuaC0re JIT, enabling homebrew apps from userland with NES support up to firmware 13.00 - Khandiaz6262/EmuC0re
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Payload-Obfuscation
👤 项目作者: SilentisVox
🛠 开发语言: C
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 07:54:26
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Payload-Obfuscation
👤 项目作者: SilentisVox
🛠 开发语言: C
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 07:54:26
📝 项目描述:
Shellcode encryption & obfuscation to evade AV🔗 点击访问项目地址
GitHub
GitHub - SilentisVox/Payload-Obfuscation: Shellcode Encryption and Obfuscation
Shellcode Encryption and Obfuscation. Contribute to SilentisVox/Payload-Obfuscation development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: x64-calc-popper-shellcode
👤 项目作者: MirraLis
🛠 开发语言: Assembly
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 18:01:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: x64-calc-popper-shellcode
👤 项目作者: MirraLis
🛠 开发语言: Assembly
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 18:01:59
📝 项目描述:
x64 Windows PEB walker in NASM. Resolves exports by hash comparison without importing any APIs. Features a custom salted hash function and XOR-obfuscated payload string.🔗 点击访问项目地址
GitHub
GitHub - MirraLis/x64-calc-popper-shellcode: x64 Windows PEB walker in NASM. Resolves exports by hash comparison without importing…
x64 Windows PEB walker in NASM. Resolves exports by hash comparison without importing any APIs. Features a custom salted hash function and XOR-obfuscated payload string. - MirraLis/x64-calc-popper-...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: peekaboo
👤 项目作者: cocomelonc
🛠 开发语言: Python
⭐ Star数量: 301 | 🍴 Fork数量: 44
📅 更新时间: 2026-04-30 23:00:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: peekaboo
👤 项目作者: cocomelonc
🛠 开发语言: Python
⭐ Star数量: 301 | 🍴 Fork数量: 44
📅 更新时间: 2026-04-30 23:00:30
📝 项目描述:
It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defenders to improve detection through hands-on learning.🔗 点击访问项目地址
GitHub
GitHub - cocomelonc/peekaboo: It bridges my research with a functional tool. I want to provide a safe, open-source framework for…
It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defenders to improve detection through hands-on learning. - cocome...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Gadget-Loader
👤 项目作者: QurtiDev
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-02 16:01:43
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Gadget-Loader
👤 项目作者: QurtiDev
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-02 16:01:43
📝 项目描述:
Stealthy Go based shellcode loader🔗 点击访问项目地址
GitHub
GitHub - QurtiDev/Gadget-Loader: Stealthy Go based shellcode loader for evasion
Stealthy Go based shellcode loader for evasion. Contribute to QurtiDev/Gadget-Loader development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: airborne
👤 项目作者: 200ug
🛠 开发语言: Rust
⭐ Star数量: 27 | 🍴 Fork数量: 3
📅 更新时间: 2026-05-03 09:02:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: airborne
👤 项目作者: 200ug
🛠 开发语言: Rust
⭐ Star数量: 27 | 🍴 Fork数量: 3
📅 更新时间: 2026-05-03 09:02:08
📝 项目描述:
Shellcode reflective DLL injection in Rust🔗 点击访问项目地址
GitHub
GitHub - 200ug/airborne: Shellcode reflective DLL injection in Rust
Shellcode reflective DLL injection in Rust. Contribute to 200ug/airborne development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: band-4-window-creation
👤 项目作者: 000nico
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-05 01:01:15
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: band-4-window-creation
👤 项目作者: 000nico
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-05 01:01:15
📝 项目描述:
injects a payload into explorer.exe, which creates a window in band 4 (ZBID_IMMERSIVE_NOTIFICATION)🔗 点击访问项目地址
GitHub
GitHub - 000nico/band-4-window-creation: injects a payload into explorer.exe, which creates a window in band 4 (ZBID_IMMERSIVE_NOTIFICATION)
injects a payload into explorer.exe, which creates a window in band 4 (ZBID_IMMERSIVE_NOTIFICATION) - 000nico/band-4-window-creation
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Claude-Red
👤 项目作者: SnailSploit
🛠 开发语言: Python
⭐ Star数量: 1185 | 🍴 Fork数量: 206
📅 更新时间: 2026-05-06 06:52:07
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Claude-Red
👤 项目作者: SnailSploit
🛠 开发语言: Python
⭐ Star数量: 1185 | 🍴 Fork数量: 206
📅 更新时间: 2026-05-06 06:52:07
📝 项目描述:
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development.🔗 点击访问项目地址
GitHub
GitHub - SnailSploit/Claude-Red: claude-red is a curated library of offensive security skills designed for the Claude skills system.…
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a s...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader #Execute
📦 项目名称: MsShellcodeDev
👤 项目作者: SodaMtnDew
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-06 09:01:21
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader #Execute
📦 项目名称: MsShellcodeDev
👤 项目作者: SodaMtnDew
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-06 09:01:21
📝 项目描述:
The Solution to help Developing & Debugging as C & Deploying in Shellcode🔗 点击访问项目地址
GitHub
GitHub - SodaMtnDew/MsShellcodeDev: The Solution to help Developing & Debugging as C & Deploying in Shellcode
The Solution to help Developing & Debugging as C & Deploying in Shellcode - SodaMtnDew/MsShellcodeDev
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: PEBcraft
👤 项目作者: whoamiamleo
🛠 开发语言: C++
⭐ Star数量: 4 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-06 20:02:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: PEBcraft
👤 项目作者: whoamiamleo
🛠 开发语言: C++
⭐ Star数量: 4 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-06 20:02:17
📝 项目描述:
A utility that transforms C source code into position-independent shellcode which resolves Windows APIs using the PEB (Process Environment Block).🔗 点击访问项目地址
GitHub
GitHub - whoamiamleo/PEBcraft: A utility that transforms C source code into position-independent shellcode which resolves Windows…
A utility that transforms C source code into position-independent shellcode which resolves Windows APIs using the PEB (Process Environment Block). - whoamiamleo/PEBcraft