t00sh / assembly
Collection of Linux shellcodes
☆71Updated 8 years ago
Alternatives and similar repositories for assembly:
Users that are interested in assembly are comparing it to the libraries listed below
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆87Updated last year
- Attacking the Core associated source files☆87Updated 7 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- ☆137Updated 3 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆68Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- A Python tool to generate ROP chains☆60Updated last month
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- Function redirection via ELF tricks.☆157Updated 9 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆301Updated 7 months ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆301Updated 6 years ago
- ☆60Updated 9 years ago
- ☆63Updated 5 years ago
- An interactive memory info for pwning / exploiting☆101Updated last year
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 6 years ago
- ☆153Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆246Updated 5 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 9 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago