osirislab / ShellcodeLinks
☆137Updated 4 years ago
Alternatives and similar repositories for Shellcode
Users that are interested in Shellcode are comparing it to the libraries listed below
Sorting:
- ☆137Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- Library for creating CTF services.☆75Updated 9 years ago
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago
- ☆91Updated last year
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago
- ☆72Updated 6 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Updated 7 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆405Updated 10 years ago
- CTF writeups☆113Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 10 years ago
- PoC for CVE-2015-6086☆67Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- windows kernel vulnerability found by me☆90Updated 8 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 10 years ago
- Radare Congress Stuff☆215Updated 2 weeks ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last month
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆103Updated 4 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- Hodor! Fuzzer..☆129Updated 9 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Updated 10 years ago
- 2016 DEF CON Qualifier Challenges☆178Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- ☆22Updated 8 years ago