t00sh / assembly
Collection of Linux shellcodes
☆70Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for assembly
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆66Updated 7 years ago
- ☆26Updated 6 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆57Updated 9 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆39Updated 7 years ago
- Function redirection via ELF tricks.☆156Updated 9 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆128Updated 6 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- An interactive memory info for pwning / exploiting☆100Updated last year
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- ☆82Updated last year
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆297Updated 3 months ago
- Helper script for working with format string bugs☆56Updated 4 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- ☆100Updated 6 years ago
- Cross Architecture Shellcode in C☆198Updated 8 years ago
- ☆27Updated 6 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆149Updated 11 months ago
- Implementation of the SMM rootkit "The Watcher"☆123Updated 2 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆34Updated 7 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆159Updated 11 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆212Updated last month
- Tutorial for writing kernel exploits☆250Updated 6 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 8 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago