feliam / mkShellcode
This rearranges an ELF object file so it can be used as shellcode.
☆42Updated 10 years ago
Alternatives and similar repositories for mkShellcode:
Users that are interested in mkShellcode are comparing it to the libraries listed below
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 6 years ago
- Memory awesomeness.☆29Updated 10 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- ☆26Updated 8 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- ☆33Updated 9 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- ☆27Updated 3 years ago
- ☆28Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Updated 12 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- ☆49Updated 7 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆18Updated 9 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Updated 8 years ago
- REIL translation library☆36Updated 8 years ago
- Fuzzer☆43Updated 10 years ago
- Visualize an ELF's execution☆10Updated 10 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- ☆24Updated 9 years ago