Collection of Linux shellcodes
☆73Aug 28, 2016Updated 9 years ago
Alternatives and similar repositories for assembly
Users that are interested in assembly are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- Collecting data from the state of UDP buffers☆14Jan 30, 2017Updated 9 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- "Polymorphic" shellcode generator (x86)☆28Oct 28, 2014Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A C/C++ code obfuscator based on llvm/clang technology☆16Sep 19, 2014Updated 11 years ago
- Rust Tor Controller library☆25Apr 19, 2020Updated 6 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- Doing research on top of Jalangi☆12Sep 9, 2016Updated 9 years ago
- A "general-purpose" tracing tool☆39Jun 22, 2015Updated 10 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 8 years ago
- ☆27Jul 19, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- POC For CVE-2022-24483☆15Apr 12, 2022Updated 4 years ago
- Apple Open Directory to Samba 4 Active Directory Domain Controller migration tools☆12Jan 27, 2021Updated 5 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- ☆85Apr 17, 2020Updated 6 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Azure Sphere Source Code released under GPL license by Microsoft. (unofficial / unsupported repository)☆20Dec 23, 2019Updated 6 years ago
- FreeRTOS for BeagleBone Black☆13Jun 10, 2014Updated 11 years ago
- Secure Virtual Architecture☆42Apr 12, 2019Updated 7 years ago
- setup Ghidra environment for GitHub Actions☆17Jun 19, 2023Updated 2 years ago
- InnoSetup uninstall log reader☆12May 23, 2021Updated 4 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- A RMI(Remote Method Invocation) service for node.js. You can register objects for remote invocation, stubs are automatically created to …☆13Jun 18, 2017Updated 8 years ago
- GDB for pwn☆11Sep 10, 2025Updated 7 months ago
- ☆13Jun 26, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆23Dec 15, 2021Updated 4 years ago
- ☆28Apr 18, 2016Updated 10 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- An internal multihack for Counter-Strike: Source. Features include aimbot, triggerbot, auto bunnyhop, and anti-flash.☆14Oct 26, 2025Updated 6 months ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 6 years ago