0xdea / shellcodeLinks
A collection of my shellcode samples.
☆17Updated 3 months ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below
Sorting:
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆263Updated 9 months ago
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago
- ☆51Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Make your Ghidra Lazy!☆152Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆118Updated 9 months ago
- Leveraging patch diffing to discover new vulnerabilities☆130Updated 10 months ago
- ☆128Updated 9 months ago
- Kernel Read Write Execute☆46Updated 7 months ago
- ARM64 macOS assembly program for null-byte free shellcode☆104Updated 3 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 10 months ago
- Binarly Vulnerability Research Advisories☆180Updated last month
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆106Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- A happy heap editor to support your exploitation process☆196Updated 4 years ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆69Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated 10 months ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Automatic ROPChain Generation☆291Updated 5 years ago
- All ROPemporium binaries categorized by architecture, with solving scripts and custom flags☆23Updated 2 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 10 months ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆132Updated last week