t00sh / assemblyLinks
Collection of Linux shellcodes
☆72Updated 9 years ago
Alternatives and similar repositories for assembly
Users that are interested in assembly are comparing it to the libraries listed below
Sorting:
- Devestating and awesome Linux X86_64 ELF Virus☆232Updated 3 years ago
- Cross Architecture Shellcode in C☆205Updated 9 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆305Updated last year
- Setup for a pwning VM☆62Updated 6 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- An interactive memory info for pwning / exploiting☆99Updated 2 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆150Updated 9 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆153Updated last year
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆177Updated 12 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- GlibC Malloc for Exploiters presentation☆150Updated 6 years ago
- Exploiting challenges in Linux and Windows☆119Updated 5 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆91Updated last year
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆136Updated 7 years ago
- A simple MBR hijack demonstration☆181Updated 2 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆38Updated 7 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- Function redirection via ELF tricks.☆161Updated 10 years ago
- As near as possible to bare metal☆48Updated 2 months ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- various CTF writeups☆60Updated 7 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆70Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆137Updated 9 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- Advanced buffer overflow and memory corruption security challenges☆189Updated 3 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- ☆139Updated 3 years ago