takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities
-
Updated
Dec 17, 2025 - C
takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities
CTF framework and exploit development library
a x-platform command-line tool for extracting shellcode from PE files
a Golang tool implementing operationally viable process injection techniques for 64-bit Windows systems
shellcode compiler and machine code mutation engine
Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictability, and modularity.
From C to binary shellcode converter.
Python based tool for generating Shellcode from PIC C
From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any changes to the source code.
Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supported)! ☢️
Developed a collection of 64-bit Linux shellcodes in NASM assembly, demonstrating deep understanding of system calls, memory management, and low-level programming. Includes examples for process control, file operations, networking, and exploitation techniques, showcasing hands-on expertise in Linux security and assembly coding.
🛠️ Exploit Development: This repository is a curated collection of low-level exploit examples and shellcode execution techniques. It is designed for cybersecurity researchers, reverse engineers, and students interested in understanding how raw shellcode is constructed, injected, and executed in real environments.
Converts PE into a shellcode
Glue shellcode extracted from C together with ASM
A C++/Asm template for PIC/EXE/DLL malware
Cyber lab designed for analyzing shellcode and supporting malware analysis
Desarrollo paso a paso de loaders y payloads polimórficos, escritos exclusivamente en Ensamblador x86-64 para Linux, sin dependencias externas y utilizando solo syscalls. | Step-by-step development of polymorphic loaders and payloads, written exclusively in x86-64 Assembly for Linux, without external dependencies and using only syscalls.
Desarrollo paso a paso de cargadores de payloads, escritos exclusivamente en lenguaje Ensamblador x86-64 para Linux, sin dependencias externas y utilizando solo syscalls. | Step-by-step development of payload loaders, written exclusively in x86-64 Assembly for Linux, with no external dependencies and using only syscalls.
GenZ Shellcode Generator to execute commands with winExec API
Add a description, image, and links to the shellcode-development topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-development topic, visit your repo's landing page and select "manage topics."