shellcode are codes designed to be injected into the memory space of another process during exploitation.
☆51Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for shellcode
Users that are interested in shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of tools created for computer security research purposes.☆139Feb 2, 2026Updated 2 months ago
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 2 months ago
- Diebold Accuvote-TSx Election Machine Hacking☆41Feb 2, 2026Updated 2 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 2 months ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆182Feb 2, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 2 months ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆468Feb 22, 2026Updated last month
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated 2 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 2 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated 2 months ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆18Dec 2, 2024Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated 2 months ago
- Offensive Lua.☆225Feb 2, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- ☆13Jul 13, 2020Updated 5 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆22Jul 20, 2014Updated 11 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆16Feb 12, 2022Updated 4 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆264Feb 2, 2026Updated 2 months ago
- ☆15Mar 2, 2014Updated 12 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Sample programs demonstrating how to program in C using the Sockets API.☆40Nov 16, 2024Updated last year
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- unix-like reverse engineering framework and commandline tools☆10Mar 10, 2023Updated 3 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago