utoni / bufflowLinks
A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.
☆16Updated last year
Alternatives and similar repositories for bufflow
Users that are interested in bufflow are comparing it to the libraries listed below
Sorting:
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Zerokit server controller☆13Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- User-mode part of Zerokit platform☆20Updated 6 years ago
- RC4 Encryption with CryptoAPI and C☆15Updated 9 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago
- Anti-AV compilation☆43Updated 11 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Zerokit shared code☆16Updated 6 years ago
- ☆11Updated 4 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Updated 8 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Shellcode Of Death☆38Updated 11 years ago
- ☆24Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- ☆16Updated 7 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago