ARCH : ARM, ARM64, MIPS, PPC, X86
☆86Apr 9, 2019Updated 6 years ago
Alternatives and similar repositories for shellcode2assembly
Users that are interested in shellcode2assembly are comparing it to the libraries listed below
Sorting:
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Nov 30, 2018Updated 7 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- An attempt at Process Doppelgänging☆183Dec 21, 2017Updated 8 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- IDA Pro Scripts☆37Feb 24, 2015Updated 11 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 8 years ago
- Event Tracing for Windows Custom Events☆21Jan 28, 2015Updated 11 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A C++ library to create function hooks dynamically, so you can easily embed it into other programming languages..☆59Apr 17, 2025Updated 10 months ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆89May 9, 2019Updated 6 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- ☆24Nov 17, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Windows过滤驱动-helloworld☆24Aug 27, 2015Updated 10 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- WinPCAP for NDIS 6.x☆14Jun 24, 2019Updated 6 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Malware detection using learning and information retrieval for Android☆74Aug 11, 2020Updated 5 years ago
- ☆82Dec 3, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Penetration testing and auditing toolkit for Android apps.☆247Mar 8, 2025Updated 11 months ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago