t00sh / assemblyLinks
Collection of Linux shellcodes
☆72Updated 9 years ago
Alternatives and similar repositories for assembly
Users that are interested in assembly are comparing it to the libraries listed below
Sorting:
- Devestating and awesome Linux X86_64 ELF Virus☆234Updated 3 years ago
- Cross Architecture Shellcode in C☆208Updated 9 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆306Updated last year
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆153Updated 2 years ago
- Setup for a pwning VM☆62Updated 7 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- Advanced buffer overflow and memory corruption security challenges☆190Updated 3 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- sample linux x86_64 ELF virus☆54Updated 7 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆94Updated 2 weeks ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- An interactive memory info for pwning / exploiting☆98Updated 2 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- ☆22Updated 11 years ago
- ELF Infector's Toolkit☆65Updated 9 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 7 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆62Updated 6 years ago
- A Python tool to generate ROP chains☆65Updated 11 months ago