konatabrk / shellen
Interactive shellcoding environment to easily craft shellcodes
☆896Updated 4 years ago
Alternatives and similar repositories for shellen
Users that are interested in shellen are comparing it to the libraries listed below
Sorting:
- Payload Development Framework☆744Updated this week
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- A shellcode writing toolkit☆670Updated 3 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆957Updated 4 years ago
- binary patching from Python☆637Updated last year
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆645Updated last month
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆728Updated 2 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,667Updated last year
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 4 years ago
- Proof of Concepts (PE, PDF...)☆1,501Updated 4 months ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- An archive of low-level CTF challenges developed over the years☆630Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,420Updated 8 months ago
- Using Intel's PIN tool to solve CTF problems☆499Updated 5 years ago
- LLDB MCP Integration + other helpful commands☆720Updated last month
- A curated list of awesome projects, articles and the other materials powered by Radare2☆722Updated 5 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,119Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆687Updated 4 years ago
- fireELF - Fileless Linux Malware Framework☆668Updated 6 years ago
- ☆609Updated 2 years ago
- A list of my CVE's with POCs☆675Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,258Updated 2 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆505Updated 2 months ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- LibZeroEvil & the Research Rootkit project.☆595Updated 3 years ago
- A Pwn2Own exploit chain☆761Updated 6 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆405Updated 2 years ago