touhidshaikh / shellcode
☆11Updated 2 years ago
Alternatives and similar repositories for shellcode:
Users that are interested in shellcode are comparing it to the libraries listed below
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 7 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆70Updated 8 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Damn Small FI Scanner☆60Updated 5 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆62Updated 2 years ago
- This tool help you to decryption of AES Encrypted file in very easy way.☆8Updated 2 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- ☆93Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Web shells for use in penetration testing☆39Updated 9 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 7 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- Automatically performs the SMB relay attack☆72Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆39Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- unix wildcard attacks☆132Updated 6 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- [Windows] Local Privilege Escalation - WebClient☆57Updated 7 years ago