kunalvarudkar / x86-Assembly-Language-and-Shellcoding-on-LinuxLinks
SLAE x86 from Pentester Academy
☆14Updated 5 years ago
Alternatives and similar repositories for x86-Assembly-Language-and-Shellcoding-on-Linux
Users that are interested in x86-Assembly-Language-and-Shellcoding-on-Linux are comparing it to the libraries listed below
Sorting:
- ☆26Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- Random Exploits☆50Updated last year
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- Work in Progress repo☆14Updated 6 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆70Updated 5 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- Penetration testing with shellcode codes☆28Updated 7 years ago
- ☆36Updated 7 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- Generate image payloads in JS to bypass filters☆40Updated 4 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆13Updated 4 years ago
- Code snippets for Qiling Tutorials☆21Updated 4 years ago