Miscellaneous tools written in Python, mostly centered around shellcodes.
☆35Jun 21, 2015Updated 10 years ago
Alternatives and similar repositories for shellcode_tools
Users that are interested in shellcode_tools are comparing it to the libraries listed below
Sorting:
- Encase Script to parse harddrive for MFT data☆16Jun 17, 2016Updated 9 years ago
- Team Cymru IP to ASN command line tool☆13Nov 18, 2025Updated 4 months ago
- A tool similar to netcat, but tunneled over DNS☆18Mar 10, 2017Updated 9 years ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago
- ☆17Feb 5, 2018Updated 8 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆28Sep 13, 2016Updated 9 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- anti-virtualmachine with C!☆23Apr 10, 2016Updated 9 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Mar 21, 2019Updated 7 years ago
- 🙈 🙉 🙊 Record keystrokes in Linux environment | Keylogger written in Go☆35Oct 23, 2018Updated 7 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- A future hobby OS kernel☆11Nov 8, 2020Updated 5 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Use NAT to reroute an applications UDP traffic for MITM purposes.☆11Sep 30, 2019Updated 6 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Windows aero overlay with Direct2D & DirectWrite support☆11May 1, 2016Updated 9 years ago
- fork from http://hashlib.codeplex.com☆12Oct 27, 2025Updated 4 months ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- ☆10Jan 7, 2017Updated 9 years ago