Lazy "position independent" payload making technique for Windows
-
Updated
Feb 13, 2024 - C
Lazy "position independent" payload making technique for Windows
🛠️ Exploit Development: This repository is a curated collection of low-level exploit examples and shellcode execution techniques. It is designed for cybersecurity researchers, reverse engineers, and students interested in understanding how raw shellcode is constructed, injected, and executed in real environments.
a shellcode to write "y0u sp43k OPC0DE !?" message in an infinite loop
a x-platform command-line tool for extracting shellcode from PE files
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities
A C++/Asm template for PIC/EXE/DLL malware
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
Python based tool for generating Shellcode from PIC C
From C to binary shellcode converter.
Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictability, and modularity.
An easily modifiable shellcode template for Windows x64 written in C
Add a description, image, and links to the shellcode-development topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-development topic, visit your repo's landing page and select "manage topics."