Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I…
☆94Dec 23, 2025Updated 3 months ago
Alternatives and similar repositories for ADMMutate
Users that are interested in ADMMutate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiler exploits and exploitable non-obvious source code back doors.☆49Nov 24, 2024Updated last year
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Aug 26, 2024Updated last year
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆241Nov 19, 2025Updated 4 months ago
- ☆74Aug 4, 2022Updated 3 years ago
- docker based telnet honeypot☆80Feb 19, 2018Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆37Apr 14, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SIGSTOPing ELF binaries since 0x7E1☆57Aug 11, 2024Updated last year
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Apr 17, 2017Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Jan 11, 2015Updated 11 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Jul 31, 2015Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- ROP gadget finder and analysis in pure Javascript☆27Jun 11, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Return Oriented Programme Evolution with ROPER☆171Apr 25, 2019Updated 6 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- Cross Architecture Shellcode in C☆209Aug 24, 2016Updated 9 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- reverse engineering extension plugin for windbg☆121Sep 30, 2019Updated 6 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- ☆45Feb 24, 2018Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Jul 22, 2016Updated 9 years ago