reyammer / shellnoobLinks
A shellcode writing toolkit
☆684Updated 5 months ago
Alternatives and similar repositories for shellnoob
Users that are interested in shellnoob are comparing it to the libraries listed below
Sorting:
- Interactive shellcoding environment to easily craft shellcodes☆902Updated 4 years ago
- Payload Development Framework☆823Updated this week
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆805Updated last year
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- A tool to help you write binary exploits☆606Updated 6 years ago
- generate and search pattern string for exploit development☆201Updated 10 months ago
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 9 months ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆468Updated last year
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆759Updated 6 years ago
- metame is a metamorphic code engine for arbitrary executables☆598Updated 6 years ago
- ☆281Updated 5 years ago
- BEURK Experimental Unix RootKit☆389Updated 8 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆406Updated 11 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆654Updated last year
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- ☆351Updated 10 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆332Updated 3 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆329Updated 3 years ago
- Local UNIX PrivEsc Aggregation☆244Updated 9 years ago
- Various snippets created during malware analysis☆460Updated 2 months ago
- A colleciton of CTF write-ups all using pwntools☆519Updated 9 years ago
- Teach you a binary exploitation for great good.☆294Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆652Updated 5 months ago
- Search for code cave in all binaries☆285Updated last month
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 12 years ago
- Simplify format string exploitation.☆346Updated 4 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆451Updated 2 months ago