0xdea / shellcode
A collection of my shellcode samples.
☆13Updated last year
Alternatives and similar repositories for shellcode:
Users that are interested in shellcode are comparing it to the libraries listed below
- ☆43Updated 3 years ago
- ☆115Updated 9 months ago
- ☆71Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 9 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆124Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆239Updated 2 months ago
- ☆153Updated last year
- ☆120Updated 2 months ago
- A collection of curated resources and CVEs I use for research.☆103Updated 3 years ago
- ☆69Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- HN Security's advisories.☆21Updated 3 months ago
- Automatic ROPChain Generation☆280Updated 4 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 2 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆13Updated 4 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆106Updated 2 months ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆52Updated 2 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆145Updated 2 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆99Updated 2 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆188Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆80Updated 2 years ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆158Updated last year
- Zyxel password decrypter☆37Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆63Updated 3 months ago
- An automatic Blind ROP exploitation tool☆195Updated last year
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆101Updated 5 months ago
- ☆101Updated 3 months ago