A server for testing shellcode injection over a buffer overflow
-
Updated
Feb 11, 2020 - C
A server for testing shellcode injection over a buffer overflow
You should look through my Assembly LearningRepo first before learning Shellcoding.
An IT security project
Collection of shellcode injection and execution techniques
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
Various methods of executing shellcode
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
PoC arbitrary WPM without a process handle
drx ptrace shellcode injector
A collection of PoCs for different injection techniques on Windows!
Lazy "position independent" payload making technique for Windows
Various dll hollowing techniques
Code for example Thread-Hijacking method
Process Injection using Thread Name
A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.
Add a description, image, and links to the shellcode-injection topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-injection topic, visit your repo's landing page and select "manage topics."