Assembly/Shellcode
☆14Oct 28, 2014Updated 11 years ago
Alternatives and similar repositories for Assembly
Users that are interested in Assembly are comparing it to the libraries listed below
Sorting:
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- 通过 Webshell 创建 BugScan 节点(需要目标支持 Python2.7)☆15Nov 9, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- ☆13Oct 28, 2024Updated last year
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Windows Enumeration and Privilege Escalation Script☆18Nov 1, 2019Updated 6 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Attack script and scanner for DNS based spoofed amplification attacks.☆20Oct 16, 2016Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- Ransomware is a project written in .Net and shows how ransomeware generally works. This repository should be used for educational reasons…☆33Jan 9, 2025Updated last year
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg☆52Dec 26, 2013Updated 12 years ago
- SQL SERVER Exploitation.☆27Mar 18, 2017Updated 8 years ago
- Lightweight DNS telemetry☆55Jan 7, 2022Updated 4 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Jan 8, 2018Updated 8 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- COMPER Template Parser☆12Mar 24, 2016Updated 9 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- arp-poison (aka arp spoof) tool☆41Apr 9, 2013Updated 12 years ago
- Install a Persistent Backdoor on Jailbroken iOS Devices☆29Jul 7, 2015Updated 10 years ago
- Vue.js + Firebase sample (VueFire/Vuex)☆10Dec 13, 2018Updated 7 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Protecting the REST endpoints with reCAPTCHA and AOP☆10Nov 25, 2018Updated 7 years ago
- API for data transmission and retrieval from Monero applications through the Microsoft .NET Framework☆10Jan 16, 2017Updated 9 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- AIrmageddon is a home security AI Agent☆11Aug 30, 2024Updated last year
- DTrace script mode for Emacs☆10Jan 27, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago