☆138Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for Shellcode
Users that are interested in Shellcode are comparing it to the libraries listed below
Sorting:
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 11 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- ☆19Jun 29, 2012Updated 13 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Aug 29, 2012Updated 13 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- IDA recompiler☆31Dec 8, 2014Updated 11 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- A repository of challenges from various CTF competitions.☆157Apr 13, 2014Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago