A collection of shellcode, ripped straight from the shell-storm database. We host this just for easy access, since shell-storm cannot be reached within the Academy's Internet.
☆23Sep 27, 2016Updated 9 years ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 13, 2021Updated 4 years ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server☆12Jun 19, 2015Updated 10 years ago
- Simple TOR Socks Proxy Container☆13Jun 8, 2016Updated 9 years ago
- A repository of knowledge accumulated that may help in the other BTN challenge repos☆13May 14, 2016Updated 9 years ago
- a simple netcat wrapper☆16Apr 10, 2017Updated 8 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆26May 28, 2021Updated 4 years ago
- A gentle introduction to binary exploitation☆42May 9, 2020Updated 5 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Solutions to some crackmes that I have done.☆72Nov 2, 2022Updated 3 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- load mixed assemblies (.NET) C# source code☆14Sep 3, 2017Updated 8 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- Parse disassembly files using tree-sitter☆14Dec 3, 2023Updated 2 years ago
- Kamus Besar Bahasa Indonesia☆11Aug 26, 2025Updated 6 months ago
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- A x86/x64 class library that can be injected into unmanaged processes☆11Sep 6, 2020Updated 5 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 6 months ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- The Official Repository for BanditHijo (R)-Chive v1☆13Jan 14, 2026Updated 2 months ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated 2 years ago
- Crackme collections☆14May 24, 2020Updated 5 years ago
- My backup neovim config☆13Feb 14, 2026Updated last month