hugsy / stuffLinks
Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
☆226Updated last year
Alternatives and similar repositories for stuff
Users that are interested in stuff are comparing it to the libraries listed below
Sorting:
- Setup for a pwning VM☆62Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆36Updated 6 years ago
- Personal repository for all ctf related stuffs☆67Updated 11 months ago
- simple shellcode generator☆114Updated 8 years ago
- hax 'n shit☆120Updated 10 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆91Updated 2 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆148Updated 10 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 13 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆157Updated last year
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 11 years ago
- ☆91Updated 6 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Runtime Process Manipulation☆236Updated 10 months ago
- Exploiting MS15-061 local Privilege escalation☆49Updated 10 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- Windows Software Exploitation☆131Updated 8 years ago