earthquake / shellcodesLinks
Shellcodes for different usecases
☆9Updated 9 years ago
Alternatives and similar repositories for shellcodes
Users that are interested in shellcodes are comparing it to the libraries listed below
Sorting:
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- ☆15Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- CTF exploit development and other tools of pwnage☆21Updated 6 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Updated 7 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 7 months ago
- Format string exploit generation☆10Updated 9 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 13 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago