reyammer / shellnoob
A shellcode writing toolkit
☆660Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for shellnoob
- Payload development framework☆565Updated last month
- HORSEPILL rootkit PoC☆223Updated 8 years ago
- A colleciton of CTF write-ups all using pwntools☆505Updated 8 years ago
- A tool to help you write binary exploits☆605Updated 5 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆772Updated 8 months ago
- kernel privilege escalation enumeration and exploitation framework☆687Updated 6 years ago
- metame is a metamorphic code engine for arbitrary executables☆569Updated 5 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆737Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆673Updated 3 years ago
- Simplify format string exploitation.☆339Updated 3 years ago
- Various snippets created during malware analysis☆457Updated last year
- binary patching from Python☆631Updated last year
- Interactive shellcoding environment to easily craft shellcodes☆892Updated 3 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆384Updated 5 years ago
- Official repository for Pyew.☆383Updated 5 years ago
- peinjector - MITM PE file infector☆598Updated 8 years ago
- A reverse engineering framework written in Python.☆495Updated 8 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆446Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆486Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆458Updated 4 months ago
- Cminer is a tool for enumerating the code caves in PE files.☆143Updated last year
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated last year
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆635Updated last month
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆226Updated 2 weeks ago
- Repository to train/learn memory corruption on the ARM platform.☆353Updated 7 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆402Updated 10 years ago
- ☆278Updated 4 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆501Updated 4 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago