π€© Emoji shellcoding tools for RISC-V (32-bit and 64-bit)
β174Aug 6, 2025Updated 8 months ago
Alternatives and similar repositories for emoji-shellcoding
Users that are interested in emoji-shellcoding are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Alphanumeric+1 shellcoding tools for RISC-Vβ36Aug 12, 2019Updated 6 years ago
- GitHub CVE Repository Huntβ17Jul 23, 2024Updated last year
- β16Jun 9, 2023Updated 2 years ago
- β34Dec 23, 2025Updated 3 months ago
- β15Jun 23, 2024Updated last year
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliabilityβ91May 12, 2022Updated 3 years ago
- β38Apr 7, 2023Updated 3 years ago
- β16Sep 27, 2021Updated 4 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeupβ10May 3, 2023Updated 2 years ago
- β86Aug 8, 2024Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscatorβ19Jun 30, 2022Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog postβ24Sep 19, 2022Updated 3 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)β42Jun 6, 2023Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information classβ27Sep 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Command and Control Framework using powershell implantsβ36Jun 17, 2025Updated 9 months ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)β567Sep 12, 2023Updated 2 years ago
- β14Dec 26, 2022Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attributeβ¦β155Jun 18, 2023Updated 2 years ago
- β64Nov 26, 2021Updated 4 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting wβ¦β10Jul 25, 2023Updated 2 years ago
- Linux kernel LPE practice with an NPD vulnerabilityβ36Jul 11, 2023Updated 2 years ago
- Mixed Boolean-Arithmetic in Rust for WebAssemblyβ31Jun 14, 2025Updated 9 months ago
- This tool can be useful for solving some reversing challenges in CTFs events.β15Nov 1, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- β38Jun 5, 2023Updated 2 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.β20May 15, 2025Updated 10 months ago
- β393Oct 2, 2022Updated 3 years ago
- Internals information about Hyper-Vβ733Mar 7, 2026Updated last month
- Windows x64 kernel mode rootkit process hollowing POC.β190Jun 30, 2023Updated 2 years ago
- Multi-tool reverse engineering collaboration solution.β142Mar 27, 2024Updated 2 years ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!β453Mar 8, 2023Updated 3 years ago
- A Cython reverse helper with analyzing Ghidra P-Code. For 2024 CTFCON.β11Aug 16, 2024Updated last year
- β29Dec 29, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Terminate AV/EDR leveraging BYOVD attackβ103Mar 21, 2025Updated last year
- β72Feb 28, 2023Updated 3 years ago
- A dark Nord theme port for Hex Rays IDAβ103Aug 19, 2022Updated 3 years ago
- Source code for the DEF CON 30 CTF Qualifiers.β266May 27, 2024Updated last year
- β16Sep 26, 2016Updated 9 years ago
- π explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.β23Jun 18, 2023Updated 2 years ago
- The first analysis framework for CPU microcodeβ412Mar 13, 2023Updated 3 years ago