This rearranges an ELF object file so it can be used as shellcode.
☆44Sep 12, 2014Updated 11 years ago
Alternatives and similar repositories for mkShellcode
Users that are interested in mkShellcode are comparing it to the libraries listed below
Sorting:
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- ☆73Oct 15, 2014Updated 11 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- print information from LLVM dataflow analyses☆13Jan 22, 2020Updated 6 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Cross Architecture Shellcode in C☆208Aug 24, 2016Updated 9 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- Injection of managed code into non-managed Windows applications☆28Jan 17, 2019Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Jan 7, 2013Updated 13 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Old NVIDIA CUDA implementation of salted MD5 brute-force☆17Jun 2, 2016Updated 9 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- A shared libraries injection tool.☆128Nov 9, 2014Updated 11 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Python script to monitor new Pastebin pastes for a provided search term☆18Aug 6, 2012Updated 13 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Jun 27, 2017Updated 8 years ago
- ☆45Jun 16, 2017Updated 8 years ago