This rearranges an ELF object file so it can be used as shellcode.
☆44Sep 12, 2014Updated 11 years ago
Alternatives and similar repositories for mkShellcode
Users that are interested in mkShellcode are comparing it to the libraries listed below
Sorting:
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- Cross Architecture Shellcode in C☆208Aug 24, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A set of IDA Pro scripts to make Tree of Savior client reverse engineering easier☆17Dec 29, 2015Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Mar 15, 2015Updated 10 years ago
- ☆73Oct 15, 2014Updated 11 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- MD5 algorithm implementation - x86 assembler☆25Mar 15, 2015Updated 10 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Some exploits and exploit development stuff.☆152Feb 19, 2022Updated 4 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago