ebubekirtrkr / c2shellcodeLinks
Converts C programs that only use syscalls to 64 bit assembly file.
☆12Updated 4 years ago
Alternatives and similar repositories for c2shellcode
Users that are interested in c2shellcode are comparing it to the libraries listed below
Sorting:
- This repo contain Android malware samples and analysis☆13Updated 4 years ago
- Notes for Assembly language☆15Updated 5 years ago
- qiling framework examples☆16Updated 3 years ago
- ☆29Updated 5 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 3 years ago
- ☆19Updated 3 years ago
- Winsock accept() Backdoor Implant.☆117Updated 4 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 8 years ago
- Set of pre-generated pwn.college challenges☆68Updated 2 years ago
- ☆29Updated 5 years ago
- CTF (Capture The Flag) writeups, code snippets, notes, scripts☆14Updated 5 years ago
- Statically unpacking common android banker malware.☆160Updated 8 months ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- a repo of links to useful writeups of pwn challenges☆29Updated 7 years ago
- Our team's CTF writeups☆12Updated 5 years ago
- CTFs I've played so far☆17Updated 10 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- Using Spotify Playlists as Malware CDN☆26Updated 4 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆84Updated 8 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 10 months ago
- ☆49Updated 5 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆33Updated 4 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆123Updated 4 years ago