A collection of tricky (and sometimes) funny shellcodes
☆24May 14, 2011Updated 14 years ago
Alternatives and similar repositories for shellcodes
Users that are interested in shellcodes are comparing it to the libraries listed below
Sorting:
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Minimal ARM/Thumb linear sweep disassembler similar to objdump☆10Jun 6, 2016Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- ☆13Feb 8, 2019Updated 7 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- A Libemu Cython wrapper☆128Nov 29, 2023Updated 2 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- libtalloc is a python script for use with GDB that can be used to analyse the "trivial allocator" (talloc)☆17Aug 6, 2015Updated 10 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Mar 17, 2017Updated 8 years ago
- Package alg provides access to Linux AF_ALG sockets for communication with the Linux kernel crypto API. MIT Licensed.☆16May 11, 2021Updated 4 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- is a random text generator based on context-free grammars, it uses a EBNF for grammar definitions.☆18May 5, 2025Updated 9 months ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago