Training material for the Shellcode-Lab, including Slides and Codes
☆20Jun 13, 2019Updated 6 years ago
Alternatives and similar repositories for Shellcode-Lab
Users that are interested in Shellcode-Lab are comparing it to the libraries listed below
Sorting:
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Nov 27, 2017Updated 8 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools☆25Nov 1, 2017Updated 8 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- ☆41May 16, 2018Updated 7 years ago
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Shell scripts for decompiling and analyzing binary files through the retdec.com REST API.☆12Jun 17, 2018Updated 7 years ago
- An active directory laboratory for penetration testing.☆150Dec 11, 2020Updated 5 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 7 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆744Nov 1, 2024Updated last year
- Tools for macOS Forensic Bootable media☆16May 20, 2020Updated 5 years ago
- ☆11Aug 3, 2018Updated 7 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- Maciej Sypien personal dotfiles for macOS, Linux (ubuntu)☆11Jan 25, 2026Updated last month
- Set of usefull (or not) scripts used for reverse engineering Diablo 2 v1.14d game using Ghidra☆10Jan 26, 2022Updated 4 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Node, Express, PostgreSQL, Vue 2 and Graphql CRUD Web App☆12Jun 19, 2025Updated 9 months ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- ☆17Jan 9, 2025Updated last year
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago