x86-assembly-cheat-sheet: A must-have for quick reference in x86 Assembly. Covers fundamental concepts, instruction sets, & mem management.
☆57Sep 27, 2024Updated last year
Alternatives and similar repositories for x86
Users that are interested in x86 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of awesome C frameworks, libraries, resources and other shiny things. Inspired by all the other awesome-... projects out t…☆10Aug 4, 2024Updated last year
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆21Dec 11, 2024Updated last year
- A cryptographically secure password generator that provides high-entropy passwords with configurable requirements. Uses platform-native c…☆23Oct 25, 2024Updated last year
- Various scripts I create while doing CTFs. May or may not be helpful :)☆15Dec 14, 2024Updated last year
- This repo covers Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilita…☆10Jul 18, 2023Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 8 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- Creating a Bind Shell in C☆19Aug 21, 2023Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- ☆12Aug 20, 2020Updated 5 years ago
- Native message wrappers for Google Chrome https://developer.chrome.com/extensions/nativeMessaging☆13Jun 14, 2016Updated 9 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 2 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- tcurl - uses tetsuo socket library.☆24Dec 27, 2025Updated 2 months ago
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆43Jul 18, 2023Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆68Aug 31, 2024Updated last year
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆10Oct 1, 2023Updated 2 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 3 months ago
- ☆40Nov 1, 2021Updated 4 years ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 7 months ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 3 months ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆15Oct 9, 2021Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆47Sep 3, 2023Updated 2 years ago
- Extract the opcode from the objdump of a binary☆13Dec 28, 2015Updated 10 years ago
- Experimental statically-typed compiled programming language made with LLVM and Rust.☆16Aug 1, 2024Updated last year
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- My adventures in learning about different userland malware techniques, such as syscalls, injection, unhooking or sandbox evasion.☆79Jan 10, 2024Updated 2 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- Advanced memory management features of C and C++; the differences between imperative and object-oriented paradigms. The functional paradi…☆41May 31, 2024Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year