An easily modifiable shellcode template for Windows x64 written in C
-
Updated
Jun 14, 2023 - C
An easily modifiable shellcode template for Windows x64 written in C
Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictability, and modularity.
From C to binary shellcode converter.
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
Python based tool for generating Shellcode from PIC C
A C++/Asm template for PIC/EXE/DLL malware
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
Lazy "position independent" payload making technique for Windows
a shellcode to write "y0u sp43k OPC0DE !?" message in an infinite loop
🛠️ Exploit Development: This repository is a curated collection of low-level exploit examples and shellcode execution techniques. It is designed for cybersecurity researchers, reverse engineers, and students interested in understanding how raw shellcode is constructed, injected, and executed in real environments.
takes shellcode with null-bytes & "denullifies" it
a x-platform command-line tool for extracting shellcode from PE files
Add a description, image, and links to the shellcode-development topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-development topic, visit your repo's landing page and select "manage topics."