CX330Blake / Shellcode-IDELinks
Shellcode IDE — makes developing and analyzing shellcode much more convenient.
☆106Updated 2 weeks ago
Alternatives and similar repositories for Shellcode-IDE
Users that are interested in Shellcode-IDE are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆224Updated 7 months ago
- Collection of codes focused on Linux rootkits☆187Updated last month
- BSides Prishtina 2024 Malware Development and Persistence workshop☆117Updated 6 months ago
- ☆164Updated 9 months ago
- a tool used to analyze and monitor in named pipes☆192Updated last year
- ☆157Updated 5 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆569Updated 3 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆262Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆117Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆159Updated 2 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆153Updated 3 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆317Updated last month
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆86Updated last month
- Windows rootkit designed to work with BYOVD exploits☆211Updated 10 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆155Updated 4 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆108Updated 3 years ago
- Source code for complete MALicious softWARE books I & II☆61Updated last month
- This is practice VM for malware development☆169Updated 3 weeks ago
- early cascade injection PoC based on Outflanks blog post☆231Updated last year
- Binary Exploitation Phrack CTF Challenge☆138Updated 3 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆121Updated last year
- ☆154Updated 7 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆275Updated last year
- kernel callback removal (Bypassing EDR Detections)☆204Updated 3 weeks ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆414Updated last week
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆87Updated 9 months ago
- Direct access to NTFS volumes☆287Updated 3 months ago
- ☆105Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆95Updated last month
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆314Updated last year