CTF framework and exploit development library
-
Updated
Feb 4, 2022 - Python
{{ message }}
A shell is a text-based terminal, used for manipulating programs and files. Shell scripts typically manage program execution.
CTF framework and exploit development library
venom - C2 shellcode generator/compiler/handler
Converts PE into a shellcode
Python low-interaction honeyclient
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
Modernish is a library for writing robust, portable, readable, and powerful programs for POSIX-based shells and utilities.
Antivirus evasion project
Load shellcode into a new process
AV Evasion Tool For Red Team Ops
Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace
First of all, thanks for your work and publishing it along with the very interesting blog post.
I've been playing a bit with your POC, especially the Rust version, and there is something I'm not fully getting. Depending on the victim process, I get the following results:
Evasive shellcode loader for bypassing event-based injection detection (PoC)
Security CTF Toolkit (Not maintained anymore)
Update Version 3.1 added free SMS messaging.
CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.
Linux and Windows shellcode enrichment utility
https://github.com/jthuraisamy/SysWhispers