A collection of tricky (and sometimes) funny shellcodes
☆24May 14, 2011Updated 14 years ago
Alternatives and similar repositories for shellcodes
Users that are interested in shellcodes are comparing it to the libraries listed below
Sorting:
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- ☆16May 22, 2015Updated 10 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- A Libemu Cython wrapper☆129Nov 29, 2023Updated 2 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Powerful Python tool to analyze PDF documents☆26May 15, 2022Updated 3 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- ☆13Feb 8, 2019Updated 7 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- A simple port forwarding utility for TCP and UDP☆14Oct 7, 2013Updated 12 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago