Small tool for disassembling shellcode (using objdump)
☆149Jun 19, 2022Updated 3 years ago
Alternatives and similar repositories for shellconv
Users that are interested in shellconv are comparing it to the libraries listed below
Sorting:
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago
- Web interface for the Volatility Memory Forensics Framework☆259Nov 21, 2017Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Persistent IAT hooking application - based on bearparser☆265Sep 18, 2022Updated 3 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 2 years ago
- ELF header abuse☆50Mar 23, 2016Updated 9 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- ViDi Visual Disassembler (experimental)☆79Oct 8, 2025Updated 5 months ago
- A tool to help you write binary exploits☆609Feb 21, 2019Updated 7 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Demos of various injection techniques found in malware☆794Feb 15, 2022Updated 4 years ago
- A malware/botnet analysis framework written in Ruby.☆195Sep 26, 2023Updated 2 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 6 months ago
- Semantic Binary Code Analysis Framework☆125Sep 28, 2015Updated 10 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- A distributed fuzzing testing suite with web administration☆374Jan 14, 2019Updated 7 years ago