takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities
-
Updated
Dec 17, 2025 - C
takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities
a x-platform command-line tool for extracting shellcode from PE files
Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictability, and modularity.
From C to binary shellcode converter.
Python based tool for generating Shellcode from PIC C
🛠️ Exploit Development: This repository is a curated collection of low-level exploit examples and shellcode execution techniques. It is designed for cybersecurity researchers, reverse engineers, and students interested in understanding how raw shellcode is constructed, injected, and executed in real environments.
A C++/Asm template for PIC/EXE/DLL malware
Lazy "position independent" payload making technique for Windows
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
An easily modifiable shellcode template for Windows x64 written in C
a shellcode to write "y0u sp43k OPC0DE !?" message in an infinite loop
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
Add a description, image, and links to the shellcode-development topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-development topic, visit your repo's landing page and select "manage topics."