A collection of my shellcode samples.
☆23Nov 10, 2025Updated 6 months ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- NASM macOS translation of the source code listings distributed with the Art of 64-bit Assembly Language book.☆20Nov 10, 2025Updated 6 months ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆32Nov 10, 2025Updated 6 months ago
- ☆22Jan 15, 2025Updated last year
- The Ultrix-11 3.1 source code.☆24Dec 4, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆299Jan 31, 2026Updated 3 months ago
- Exploit for CVE-2023-38571☆14Sep 27, 2023Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆71Aug 21, 2025Updated 9 months ago
- Skills To Improve Before Heading to OSCP☆15May 14, 2017Updated 9 years ago
- Cisco RV042/016/082 Router Firmware☆14Mar 8, 2020Updated 6 years ago
- A simple 68K virtual platform for FUZIX bring up and similar purposes☆20Jan 21, 2025Updated last year
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆114Updated this week
- PoC for Foxit Reader CVE-2018-14442☆58Dec 28, 2018Updated 7 years ago
- #INFILTRATE20 raptor's party pack.☆30Nov 10, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some useful tools for all kinds of Embedded device.☆11Oct 12, 2015Updated 10 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆65Nov 10, 2017Updated 8 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 6 months ago
- Configuration templates for common network security platforms.☆27Nov 7, 2025Updated 6 months ago
- ☆12Jul 27, 2017Updated 8 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- SightHouse is a tool designed to assist reverse engineers by retrieving information and metadata from programs and identifying similar fu…☆71Apr 27, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Generate a report with charts and statistics about cracked passwords in XLSX format☆37Dec 4, 2025Updated 5 months ago
- The Silcos kernel is a hybrid, robust and compact modular kernel which provides a platform to build the Silcos OS and SilkUI☆11Jun 22, 2019Updated 6 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- 驱动开发工具包☆11Dec 8, 2018Updated 7 years ago
- Hex-Rays CLI (HCLI)☆87May 13, 2026Updated last week
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 9 months ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 3 years ago
- SEAL GUI for DOS☆14Jun 14, 2023Updated 2 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- Contents from Solaris 8 Source Foundation☆11Oct 11, 2021Updated 4 years ago
- A free implementation of DCE RPC, with development aimed at implementing DCOM for Linux (and other UNIX systems).☆10Sep 5, 2013Updated 12 years ago
- ☆17Dec 16, 2014Updated 11 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Bare metal programming experiments for 68040-based NeXT systems☆12Sep 12, 2022Updated 3 years ago
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year