7feilee / shellcodeLinks
A collection of shellcode, ripped straight from the shell-storm database. We host this just for easy access, since shell-storm cannot be reached within the Academy's Internet.
☆19Updated 8 years ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below
Sorting:
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆174Updated 12 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆107Updated last year
- simple shellcode generator☆113Updated 8 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆128Updated 3 years ago
- LD_PRELOAD rootkit☆134Updated last year
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆97Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆28Updated 4 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆110Updated 3 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Updated last year
- Reverse engineering challenges☆51Updated 5 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- 0xpat blog☆101Updated 3 years ago
- king of the hill cybersecurity competition☆30Updated 3 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 2 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆152Updated 2 years ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆84Updated 6 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆24Updated 10 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 2 years ago
- x64 Windows Exploit Development☆112Updated 11 months ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- www.phrack.org☆76Updated 2 years ago
- ☆84Updated 7 years ago
- Exploit Development, Reverse Engineering & Cryptography☆255Updated 4 years ago
- a summary of linux rootkits published on GitHub☆179Updated 5 years ago
- Rootless keylogger for X☆34Updated 5 years ago
- ☆65Updated 8 years ago