feliam / mkShellcodeLinks
This rearranges an ELF object file so it can be used as shellcode.
☆42Updated 10 years ago
Alternatives and similar repositories for mkShellcode
Users that are interested in mkShellcode are comparing it to the libraries listed below
Sorting:
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 9 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- ☆26Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- ☆45Updated 7 years ago
- Tool to view heap chunks and memory writes (using pintool)☆40Updated 6 years ago
- Memory awesomeness.☆29Updated 10 years ago
- OpenType font file format fuzzer for Windows☆52Updated 12 years ago
- ☆35Updated 9 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆18Updated 9 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 9 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆65Updated 10 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 8 months ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- The educational Animus malware☆18Updated 5 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago