blacknbunny / shellcode2assemblyLinks
ARCH : ARM, ARM64, MIPS, PPC, X86
☆86Updated 6 years ago
Alternatives and similar repositories for shellcode2assembly
Users that are interested in shellcode2assembly are comparing it to the libraries listed below
Sorting:
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- [Windows] Local Privilege Escalation - WebClient☆58Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 8 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- ☆94Updated 7 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆66Updated 7 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Updated 8 years ago
- ☆53Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- ☆24Updated 7 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 10 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- ☆22Updated 8 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Trigger and exploit code for CVE-2014-4113☆42Updated 9 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆52Updated 7 years ago