An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.
☆35May 7, 2015Updated 10 years ago
Alternatives and similar repositories for x86_syscall_ref
Users that are interested in x86_syscall_ref are comparing it to the libraries listed below
Sorting:
- Automatic VLAN configuration tool for Linux☆25Jan 24, 2019Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- A fuzz job for ClamAV☆32Jun 13, 2016Updated 9 years ago
- Akamai Reflective DDoS Tool - Attack the origin host behind the Akamai Edge hosts and DDoS protection offered by Akamai services.☆264Jun 25, 2020Updated 5 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Feb 2, 2018Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- A simple fast port scanner for when you cant use Nmap on a pentest.☆69Jun 29, 2021Updated 4 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Our CTF to celebrate our hackers approaching $50M in bounty earnings!☆15Mar 25, 2023Updated 2 years ago
- Very hard chess testset☆15Oct 22, 2016Updated 9 years ago
- Scripts to analyze audio CD data quality☆24Apr 24, 2021Updated 4 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- ☆23Jan 4, 2017Updated 9 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- Enable Virtualenv or Conda in IDAPython☆42Nov 11, 2020Updated 5 years ago
- ELF header abuse☆50Mar 23, 2016Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆49Mar 8, 2026Updated 2 weeks ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Apr 22, 2018Updated 7 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago