Collection of Linux shellcodes
☆72Aug 28, 2016Updated 9 years ago
Alternatives and similar repositories for assembly
Users that are interested in assembly are comparing it to the libraries listed below
Sorting:
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- Collecting data from the state of UDP buffers☆14Jan 30, 2017Updated 9 years ago
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.☆24Apr 20, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- Source code for the article "A bug story: data alignment on x86"☆17Nov 6, 2016Updated 9 years ago
- Small C example using libtcc, for C and GLSL live code editing☆18Jul 11, 2020Updated 5 years ago
- Deploy fat JARs. Restart processes.☆19Nov 23, 2010Updated 15 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- Resources related to GitHub Security Lab☆15May 7, 2021Updated 4 years ago
- ☆25Jul 19, 2024Updated last year
- Generate JSON system call info from Linux source☆149Jul 17, 2021Updated 4 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated last year
- A C/C++ code obfuscator based on llvm/clang technology☆16Sep 19, 2014Updated 11 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- user space tool for inspection and simple manipulation of eBPF programs and maps☆25Feb 1, 2018Updated 8 years ago
- Linux/Unix Security Auditing Scripts: Lusas☆23Jun 27, 2017Updated 8 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Nov 21, 2020Updated 5 years ago
- haze binary fuzzer☆56May 19, 2024Updated last year
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 3 months ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- Dump page tables on various OSes and analyze them☆31Jan 15, 2016Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- A new type of js fuzzer☆26Feb 10, 2020Updated 6 years ago