reyammer / shellnoob
A shellcode writing toolkit
☆662Updated 3 years ago
Alternatives and similar repositories for shellnoob:
Users that are interested in shellnoob are comparing it to the libraries listed below
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Payload development framework☆708Updated last month
- metame is a metamorphic code engine for arbitrary executables☆578Updated 5 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆782Updated last year
- A tool to help you write binary exploits☆609Updated 6 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆746Updated 6 years ago
- ☆279Updated 4 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆654Updated last year
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆893Updated 4 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆236Updated 8 years ago
- Repository to train/learn memory corruption on the ARM platform.☆351Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆643Updated last month
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆403Updated 10 years ago
- The Damn Vulnerable Router Firmware Project☆683Updated 3 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆148Updated last year
- A reverse engineering framework written in Python.☆500Updated 8 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 8 months ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago
- generate and search pattern string for exploit development☆200Updated last month
- (extensible) Data Exfiltration Toolkit (DET)☆824Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- BEURK Experimental Unix RootKit☆382Updated 7 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆447Updated 9 years ago
- ☆960Updated last month
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆232Updated 2 weeks ago
- Exercises for learning Reverse Engineering and Exploitation.☆383Updated 6 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆168Updated 5 years ago