Offensive C++ is a collection of offensive security snippets written in C++. It includes various tools for penetration testing and exploit development.
The purpose of this project is to provide colleciton of snippets that can be used for penetration testing and exploit development. Currently, the project contains snippets for:
- AV/EDR Evasion
- Enumeration
- Sandbox Evasion
- Shellcode Execution
- WinAPI Examples
-
C/C++ is a compiled language, which means that it can produce code that is optimized for the specific target platform.
-
C/C++ is a low-level programming language that offers a high degree of control over system resources.
-
C/C++ allows direct memory manipulation and flexibility.
-
C/C++ provides a high level of performance and efficiency.
-
C/C++ offers the ability to easily interface with other low-level languages like assembly.
-
C/C++ has a large and active community of developers, which means that there is a wealth of resources, libraries, and tools available for exploit development.
This repo does not come with precompiled binaries. Before compiling, make sure you have:
-
A C++ compiler: Microsoft Visual C++ compiler is included in Microsoft Visual Studio or you can install the GCC compiler through MinGW or Cygwin.
-
An Integrated Development Environment (IDE), in my case "Visual Studio 2017".
-
The Windows SDK: The Windows SDK includes headers, libraries, and tools that are necessary for developing Windows applications in C++.
Here you can find a list of external open source project I have included.
Contributions to Offensive C++ are welcome. To contribute, please fork the repository and submit a pull request. Please make sure that your code is well-documented and tested.
Offensive C++ is released under the MIT License (https://opensource.org/license/mit/). Please see the LICENSE file for more information.