mirror of
				https://github.com/mgeeky/Penetration-Testing-Tools.git
				synced 2025-11-04 13:05:26 +01:00 
			
		
		
		
	Added ShellcodeFluctuation
This commit is contained in:
		
							
								
								
									
										3
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										3
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							@@ -61,3 +61,6 @@
 | 
			
		||||
[submodule "windows/ThreadStackSpoofer"]
 | 
			
		||||
	path = windows/ThreadStackSpoofer
 | 
			
		||||
	url = https://github.com/mgeeky/ThreadStackSpoofer
 | 
			
		||||
[submodule "windows/ShellcodeFluctuation"]
 | 
			
		||||
	path = windows/ShellcodeFluctuation
 | 
			
		||||
	url = https://github.com/mgeeky/ShellcodeFluctuation
 | 
			
		||||
 
 | 
			
		||||
@@ -100,9 +100,11 @@ PS> python3 rdpFileUpload.py -v -f certutil README.md
 | 
			
		||||
 | 
			
		||||
- **`revshell.c`** - Utterly simple reverse-shell, ready to be compiled by `mingw-w64` on Kali. No security features attached, completely not OPSEC-safe.
 | 
			
		||||
 | 
			
		||||
- [**`ShellcodeFluctuation`**](https://github.com/mgeeky/ShellcodeFluctuation) - An in-memory evasion technique fluctuating shellcode memory protection between RW & RX and encrypting/decrypting contents.
 | 
			
		||||
 | 
			
		||||
- **`Simulate-DNSTunnel.ps1`** - Performs DNS Tunnelling simulation for purpose of triggering installed Network IPS and IDS systems, generating SIEM offenses and picking up Blue Teams.
 | 
			
		||||
 | 
			
		||||
- **`ThreadStackSpoofer`** - A PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based memory examination rules and better hide shellcodes while in-process memory.
 | 
			
		||||
- [**`ThreadStackSpoofer`**](https://github.com/mgeeky/ThreadStackSpoofer) - A PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based memory examination rules and better hide shellcodes while in-process memory.
 | 
			
		||||
 | 
			
		||||
- **`UnhookMe`** - Dynamically unhooking imports resolver. Implementation of dynamic imports resolver that would be capable of unhooking used functions in-the-fly is yet another step towards strengthening adversary resilience efforts. 
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1
									
								
								windows/ShellcodeFluctuation
									
									
									
									
									
										Submodule
									
								
							
							
								
								
								
								
								
							
						
						
									
										1
									
								
								windows/ShellcodeFluctuation
									
									
									
									
									
										Submodule
									
								
							 Submodule windows/ShellcodeFluctuation added at fe006c6569
									
								
							
		Reference in New Issue
	
	Block a user