shellcoderhandbook source code : "The Shellcoder's Handbook: Discovering and Exploiting Security Holes"
☆75Jan 22, 2014Updated 12 years ago
Alternatives and similar repositories for shellcoderhandbook
Users that are interested in shellcoderhandbook are comparing it to the libraries listed below
Sorting:
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Android tool based on arp security!☆11Jul 11, 2017Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- Generic exploit for master key vulnerability in Android☆33Feb 6, 2015Updated 11 years ago
- modified py2exe to support unicode paths☆17Mar 14, 2014Updated 12 years ago
- another pwndb tool with more options☆15Mar 20, 2021Updated 5 years ago
- Capture The Flag Write-ups☆26Apr 2, 2019Updated 6 years ago
- A VM for CTF binary exploitation challenges☆20Mar 11, 2020Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- An addon for the graphviz library to produce mind maps☆21Oct 19, 2022Updated 3 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- ☆13Apr 17, 2018Updated 7 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- Easily inject code into OS X apps☆63Oct 1, 2013Updated 12 years ago
- Free sampling of files from the purported Equation Group hack.☆11Apr 10, 2017Updated 8 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- Code to accompany the paper "Learning Grimaces By Watching TV" and FaceValue dataset☆12Aug 4, 2018Updated 7 years ago
- Remote Windows shell☆31Jun 22, 2014Updated 11 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- USB bootloader for the CC1111 RF SoC (rfcat version)☆34Nov 4, 2023Updated 2 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- ☆11Mar 20, 2025Updated last year
- Record and playback a terminal session☆15Feb 4, 2013Updated 13 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- ☆74Jan 25, 2018Updated 8 years ago