t00sh / assembly
Collection of Linux shellcodes
☆71Updated 8 years ago
Alternatives and similar repositories for assembly:
Users that are interested in assembly are comparing it to the libraries listed below
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- ☆52Updated 6 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆151Updated last year
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆68Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- ☆26Updated 6 years ago
- Just another (unfinished) kernel from scratch...☆45Updated 3 years ago
- Some kernel exploits☆144Updated 7 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- A Python tool to generate ROP chains☆60Updated 3 weeks ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- Rootkit Detector for UNIX☆62Updated last year
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆300Updated 6 months ago
- PEDA-like debugger UI for WinDbg☆202Updated 10 months ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Linux v4.x.x Rootkit☆88Updated 6 months ago
- Exploitation on ARM-based Systems (Troopers18)☆147Updated 6 years ago
- ☆63Updated 5 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Linux kernel exploitation experiments☆191Updated 3 weeks ago
- ☆60Updated 9 years ago
- Copy of the contents at phrack.com☆38Updated 5 months ago