shellcode are codes designed to be injected into the memory space of another process during exploitation.
☆51Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 2 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 2 months ago
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 2 months ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆18Dec 2, 2024Updated last year
- Offensive Lua.☆224Feb 2, 2026Updated 2 months ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- ☆13Jul 13, 2020Updated 5 years ago
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A continuation of my 'ferret' project that extracts useful information from networks.☆22Jul 20, 2014Updated 11 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 2 months ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 2 months ago
- ☆16Feb 12, 2022Updated 4 years ago
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆27Jul 26, 2024Updated last year
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- DDoS tool in Italiano☆14Nov 15, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆263Feb 2, 2026Updated 2 months ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Some handy script to collect hosts installed redis (using Shodan search engine) and exploit them☆18Aug 20, 2016Updated 9 years ago
- Detonate malware on VMs and get logs & detection status☆88Updated this week
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- unix-like reverse engineering framework and commandline tools☆10Mar 10, 2023Updated 3 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago