Neetx / Shellcode-ExtractorLinks
Python script to extract shellcode from object/executable files
☆15Updated 3 years ago
Alternatives and similar repositories for Shellcode-Extractor
Users that are interested in Shellcode-Extractor are comparing it to the libraries listed below
Sorting:
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- An ELF / PE binary packer written in pure C, made for fun☆106Updated last year
- Assembly language files and Shellcode☆37Updated 4 years ago
- Reverse text segment x64 ELF infector written in Assembly☆20Updated 4 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Updated 3 years ago
- A cross-platform Python toolkit for parsing/writing PE files.☆66Updated last year
- PT_NOTE to PT_LOAD x64 ELF infector written in Assembly☆49Updated 4 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆46Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆76Updated 2 years ago
- Another linux ELF packer to evade hash detection.☆35Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- Vulnerability analysis and proof of concepts☆37Updated 2 years ago
- ☆90Updated 5 years ago
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆31Updated 2 years ago
- Code injection from Linux kernel to a process☆24Updated 2 years ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆34Updated 8 years ago
- Files for the packer tutorial☆75Updated 4 years ago
- ☆58Updated 4 years ago
- Assembly block for hooking windows API functions.☆92Updated 6 years ago
- https://0xrick.github.io/win-internals/pe8/☆50Updated 4 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- A set of small utilities, helpers for PIN tracers☆35Updated 3 months ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 11 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- The Linux x86/x86-64 last chance debugging tool☆48Updated 3 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago