shellcoderhandbook source code : "The Shellcoder's Handbook: Discovering and Exploiting Security Holes"
☆74Jan 22, 2014Updated 12 years ago
Alternatives and similar repositories for shellcoderhandbook
Users that are interested in shellcoderhandbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated last year
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Android tool based on arp security!☆11Jul 11, 2017Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- ☆10Mar 31, 2016Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- ☆138Sep 27, 2021Updated 4 years ago
- An extension to the standard python 2.x smtpd library implementing implicit/explicit SSL/TLS/STARTTLS☆11Nov 29, 2018Updated 7 years ago
- Generic exploit for master key vulnerability in Android☆34Feb 6, 2015Updated 11 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- another pwndb tool with more options☆14Mar 20, 2021Updated 5 years ago
- modified py2exe to support unicode paths☆17Mar 14, 2014Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Capture The Flag Write-ups☆26Apr 2, 2019Updated 7 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- ☆120Apr 1, 2018Updated 8 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- ☆31Nov 24, 2014Updated 11 years ago
- 使用intel pin来求解一部分CTF challenge☆32Jul 1, 2018Updated 7 years ago
- Tabnabbing demo.☆17Feb 28, 2015Updated 11 years ago
- Samsung TV Denial of Service (DoS) Attack☆35Nov 18, 2016Updated 9 years ago
- 管道监视器,类似于spyxx之类的东西,一般用于监视目标进程的系统调用.关键词:detours+piep☆24Feb 26, 2014Updated 12 years ago
- Collection of Security Related Examples for Learning Purposes☆12Jan 29, 2016Updated 10 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆36Aug 20, 2013Updated 12 years ago
- Easily inject code into OS X apps☆63Oct 1, 2013Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Free sampling of files from the purported Equation Group hack.☆11Apr 10, 2017Updated 9 years ago
- Mobile Pentest related stuff☆15Jun 14, 2017Updated 8 years ago
- Code to accompany the paper "Learning Grimaces By Watching TV" and FaceValue dataset☆12Aug 4, 2018Updated 7 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- USB bootloader for the CC1111 RF SoC (rfcat version)☆35Nov 4, 2023Updated 2 years ago
- ☆11Mar 20, 2025Updated last year