A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.
☆16Apr 5, 2024Updated last year
Alternatives and similar repositories for bufflow
Users that are interested in bufflow are comparing it to the libraries listed below
Sorting:
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 12 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- ☆10Jun 26, 2024Updated last year
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 2 months ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Anything ( :-) ) you can do with a MS-Windows file (but faster)☆15Nov 23, 2023Updated 2 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Shared Obfuscation Headers☆15Apr 20, 2019Updated 6 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated 3 weeks ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Jun 4, 2019Updated 6 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 9 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- Microsoft Redistributable Download & Installer☆18Oct 14, 2019Updated 6 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago