ixty / xarch_shellcodeLinks
Cross Architecture Shellcode in C
☆206Updated 9 years ago
Alternatives and similar repositories for xarch_shellcode
Users that are interested in xarch_shellcode are comparing it to the libraries listed below
Sorting:
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 9 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆170Updated 10 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆169Updated 8 years ago
- C++-based shellcode builder☆115Updated 4 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 11 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆86Updated 9 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆305Updated last year
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Updated 8 years ago
- IDA cLEMENCy Tools☆63Updated 8 years ago
- CTF Challenge Framework for Windows 8 and above☆155Updated 4 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 9 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- add symbols back into a stripped ELF binary (~strip)☆175Updated 8 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- my public code☆167Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆142Updated 4 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago