merrychap / shellen
Interactive shellcoding environment to easily craft shellcodes
☆892Updated 3 years ago
Alternatives and similar repositories for shellen:
Users that are interested in shellen are comparing it to the libraries listed below
- Payload development framework☆701Updated this week
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆952Updated 4 years ago
- A shellcode writing toolkit☆661Updated 2 years ago
- A tool to help you write binary exploits☆607Updated 5 years ago
- binary patching from Python☆634Updated last year
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,662Updated last year
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆744Updated last year
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆642Updated last week
- Visualization of heap operations.☆604Updated 2 months ago
- Using Intel's PIN tool to solve CTF problems☆498Updated 4 years ago
- My proof-of-concept exploits for the Linux kernel☆1,462Updated 2 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated 2 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- An archive of low-level CTF challenges developed over the years☆617Updated 3 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆726Updated 2 years ago
- A framework for Backdoor development!☆436Updated 6 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,125Updated last year
- Linux bind shell with anti-reverse engineering techniques☆284Updated 8 years ago
- Tool for extracting information from newly spawned processes☆745Updated 3 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆780Updated 11 months ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,254Updated 2 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,910Updated 3 months ago
- metame is a metamorphic code engine for arbitrary executables☆575Updated 5 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆501Updated this week
- Teach you a binary exploitation for great good.☆293Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆679Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,396Updated 5 months ago
- fireELF - Fileless Linux Malware Framework☆661Updated 5 years ago