🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Payload-Obfuscation
👤 项目作者: SilentisVox
🛠 开发语言: C
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 07:54:26
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Payload-Obfuscation
👤 项目作者: SilentisVox
🛠 开发语言: C
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 07:54:26
📝 项目描述:
Shellcode encryption & obfuscation to evade AV🔗 点击访问项目地址
GitHub
GitHub - SilentisVox/Payload-Obfuscation: Shellcode Encryption and Obfuscation
Shellcode Encryption and Obfuscation. Contribute to SilentisVox/Payload-Obfuscation development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: x64-calc-popper-shellcode
👤 项目作者: MirraLis
🛠 开发语言: Assembly
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 18:01:59
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: x64-calc-popper-shellcode
👤 项目作者: MirraLis
🛠 开发语言: Assembly
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-29 18:01:59
📝 项目描述:
x64 Windows PEB walker in NASM. Resolves exports by hash comparison without importing any APIs. Features a custom salted hash function and XOR-obfuscated payload string.🔗 点击访问项目地址
GitHub
GitHub - MirraLis/x64-calc-popper-shellcode: x64 Windows PEB walker in NASM. Resolves exports by hash comparison without importing…
x64 Windows PEB walker in NASM. Resolves exports by hash comparison without importing any APIs. Features a custom salted hash function and XOR-obfuscated payload string. - MirraLis/x64-calc-popper-...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: peekaboo
👤 项目作者: cocomelonc
🛠 开发语言: Python
⭐ Star数量: 301 | 🍴 Fork数量: 44
📅 更新时间: 2026-04-30 23:00:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: peekaboo
👤 项目作者: cocomelonc
🛠 开发语言: Python
⭐ Star数量: 301 | 🍴 Fork数量: 44
📅 更新时间: 2026-04-30 23:00:30
📝 项目描述:
It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defenders to improve detection through hands-on learning.🔗 点击访问项目地址
GitHub
GitHub - cocomelonc/peekaboo: It bridges my research with a functional tool. I want to provide a safe, open-source framework for…
It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defenders to improve detection through hands-on learning. - cocome...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Gadget-Loader
👤 项目作者: QurtiDev
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-02 16:01:43
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Gadget-Loader
👤 项目作者: QurtiDev
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-02 16:01:43
📝 项目描述:
Stealthy Go based shellcode loader🔗 点击访问项目地址
GitHub
GitHub - QurtiDev/Gadget-Loader: Stealthy Go based shellcode loader for evasion
Stealthy Go based shellcode loader for evasion. Contribute to QurtiDev/Gadget-Loader development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: airborne
👤 项目作者: 200ug
🛠 开发语言: Rust
⭐ Star数量: 27 | 🍴 Fork数量: 3
📅 更新时间: 2026-05-03 09:02:08
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: airborne
👤 项目作者: 200ug
🛠 开发语言: Rust
⭐ Star数量: 27 | 🍴 Fork数量: 3
📅 更新时间: 2026-05-03 09:02:08
📝 项目描述:
Shellcode reflective DLL injection in Rust🔗 点击访问项目地址
GitHub
GitHub - 200ug/airborne: Shellcode reflective DLL injection in Rust
Shellcode reflective DLL injection in Rust. Contribute to 200ug/airborne development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: band-4-window-creation
👤 项目作者: 000nico
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-05 01:01:15
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: band-4-window-creation
👤 项目作者: 000nico
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-05 01:01:15
📝 项目描述:
injects a payload into explorer.exe, which creates a window in band 4 (ZBID_IMMERSIVE_NOTIFICATION)🔗 点击访问项目地址
GitHub
GitHub - 000nico/band-4-window-creation: injects a payload into explorer.exe, which creates a window in band 4 (ZBID_IMMERSIVE_NOTIFICATION)
injects a payload into explorer.exe, which creates a window in band 4 (ZBID_IMMERSIVE_NOTIFICATION) - 000nico/band-4-window-creation
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Claude-Red
👤 项目作者: SnailSploit
🛠 开发语言: Python
⭐ Star数量: 1185 | 🍴 Fork数量: 206
📅 更新时间: 2026-05-06 06:52:07
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Claude-Red
👤 项目作者: SnailSploit
🛠 开发语言: Python
⭐ Star数量: 1185 | 🍴 Fork数量: 206
📅 更新时间: 2026-05-06 06:52:07
📝 项目描述:
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development.🔗 点击访问项目地址
GitHub
GitHub - SnailSploit/Claude-Red: claude-red is a curated library of offensive security skills designed for the Claude skills system.…
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a s...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader #Execute
📦 项目名称: MsShellcodeDev
👤 项目作者: SodaMtnDew
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-06 09:01:21
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader #Execute
📦 项目名称: MsShellcodeDev
👤 项目作者: SodaMtnDew
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-06 09:01:21
📝 项目描述:
The Solution to help Developing & Debugging as C & Deploying in Shellcode🔗 点击访问项目地址
GitHub
GitHub - SodaMtnDew/MsShellcodeDev: The Solution to help Developing & Debugging as C & Deploying in Shellcode
The Solution to help Developing & Debugging as C & Deploying in Shellcode - SodaMtnDew/MsShellcodeDev
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: PEBcraft
👤 项目作者: whoamiamleo
🛠 开发语言: C++
⭐ Star数量: 4 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-06 20:02:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: PEBcraft
👤 项目作者: whoamiamleo
🛠 开发语言: C++
⭐ Star数量: 4 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-06 20:02:17
📝 项目描述:
A utility that transforms C source code into position-independent shellcode which resolves Windows APIs using the PEB (Process Environment Block).🔗 点击访问项目地址
GitHub
GitHub - whoamiamleo/PEBcraft: A utility that transforms C source code into position-independent shellcode which resolves Windows…
A utility that transforms C source code into position-independent shellcode which resolves Windows APIs using the PEB (Process Environment Block). - whoamiamleo/PEBcraft
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: dll_wrapper
👤 项目作者: MythicAgents
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-07 22:02:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: dll_wrapper
👤 项目作者: MythicAgents
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-07 22:02:34
📝 项目描述:
Simple Native DLL Wrapper for Shellcode Payloads🔗 点击访问项目地址
GitHub
GitHub - MythicAgents/dll_wrapper: Simple Native DLL Wrapper for Shellcode Payloads
Simple Native DLL Wrapper for Shellcode Payloads. Contribute to MythicAgents/dll_wrapper development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Loader #Shellcode
📦 项目名称: Self-Cleaning-PICO-Loader
👤 项目作者: Jamil5566
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-08 12:03:06
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Loader #Shellcode
📦 项目名称: Self-Cleaning-PICO-Loader
👤 项目作者: Jamil5566
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-08 12:03:06
📝 项目描述:
🧹 Implement in-memory self-cleaning techniques for loaders, ensuring complete removal after execution while enhancing stealth in offensive operations.🔗 点击访问项目地址
GitHub
GitHub - Jamil5566/Self-Cleaning-PICO-Loader: 🧹 Implement in-memory self-cleaning techniques for loaders, ensuring complete removal…
🧹 Implement in-memory self-cleaning techniques for loaders, ensuring complete removal after execution while enhancing stealth in offensive operations. - Jamil5566/Self-Cleaning-PICO-Loader
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: PE2Shellcode
👤 项目作者: HLVprob
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-08 15:02:04
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: PE2Shellcode
👤 项目作者: HLVprob
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-05-08 15:02:04
📝 项目描述:
A reflective PE loader that converts a compiled Windows executable into position-independent shellcode that runs entirely in memory.🔗 点击访问项目地址
GitHub
GitHub - HLVprob/PE2Shellcode: A reflective PE loader that converts a compiled Windows executable into position-independent shellcode…
A reflective PE loader that converts a compiled Windows executable into position-independent shellcode that runs entirely in memory. - HLVprob/PE2Shellcode