| Skip to content | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#start-of-content |
|
| https://patch-diff.githubusercontent.com/ |
|
Sign in
| https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FalphaSeclab%2Fshellcode-resources |
| GitHub CopilotWrite better code with AI | https://github.com/features/copilot |
| GitHub SparkBuild and deploy intelligent apps | https://github.com/features/spark |
| GitHub ModelsManage and compare prompts | https://github.com/features/models |
| MCP RegistryNewIntegrate external tools | https://github.com/mcp |
| ActionsAutomate any workflow | https://github.com/features/actions |
| CodespacesInstant dev environments | https://github.com/features/codespaces |
| IssuesPlan and track work | https://github.com/features/issues |
| Code ReviewManage code changes | https://github.com/features/code-review |
| GitHub Advanced SecurityFind and fix vulnerabilities | https://github.com/security/advanced-security |
| Code securitySecure your code as you build | https://github.com/security/advanced-security/code-security |
| Secret protectionStop leaks before they start | https://github.com/security/advanced-security/secret-protection |
| Why GitHub | https://github.com/why-github |
| Documentation | https://docs.github.com |
| Blog | https://github.blog |
| Changelog | https://github.blog/changelog |
| Marketplace | https://github.com/marketplace |
| View all features | https://github.com/features |
| Enterprises | https://github.com/enterprise |
| Small and medium teams | https://github.com/team |
| Startups | https://github.com/enterprise/startups |
| Nonprofits | https://github.com/solutions/industry/nonprofits |
| App Modernization | https://github.com/solutions/use-case/app-modernization |
| DevSecOps | https://github.com/solutions/use-case/devsecops |
| DevOps | https://github.com/solutions/use-case/devops |
| CI/CD | https://github.com/solutions/use-case/ci-cd |
| View all use cases | https://github.com/solutions/use-case |
| Healthcare | https://github.com/solutions/industry/healthcare |
| Financial services | https://github.com/solutions/industry/financial-services |
| Manufacturing | https://github.com/solutions/industry/manufacturing |
| Government | https://github.com/solutions/industry/government |
| View all industries | https://github.com/solutions/industry |
| View all solutions | https://github.com/solutions |
| AI | https://github.com/resources/articles?topic=ai |
| Software Development | https://github.com/resources/articles?topic=software-development |
| DevOps | https://github.com/resources/articles?topic=devops |
| Security | https://github.com/resources/articles?topic=security |
| View all topics | https://github.com/resources/articles |
| Customer stories | https://github.com/customer-stories |
| Events & webinars | https://github.com/resources/events |
| Ebooks & reports | https://github.com/resources/whitepapers |
| Business insights | https://github.com/solutions/executive-insights |
| GitHub Skills | https://skills.github.com |
| Documentation | https://docs.github.com |
| Customer support | https://support.github.com |
| Community forum | https://github.com/orgs/community/discussions |
| Trust center | https://github.com/trust-center |
| Partners | https://github.com/partners |
| GitHub SponsorsFund open source developers | https://github.com/sponsors |
| Security Lab | https://securitylab.github.com |
| Maintainer Community | https://maintainers.github.com |
| Accelerator | https://github.com/accelerator |
| Archive Program | https://archiveprogram.github.com |
| Topics | https://github.com/topics |
| Trending | https://github.com/trending |
| Collections | https://github.com/collections |
| Enterprise platformAI-powered developer platform | https://github.com/enterprise |
| GitHub Advanced SecurityEnterprise-grade security features | https://github.com/security/advanced-security |
| Copilot for BusinessEnterprise-grade AI features | https://github.com/features/copilot/copilot-business |
| Premium SupportEnterprise-grade 24/7 support | https://github.com/premium-support |
| Pricing | https://github.com/pricing |
| Search syntax tips | https://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax |
| documentation | https://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax |
|
Sign in
| https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FalphaSeclab%2Fshellcode-resources |
|
Sign up
| https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=alphaSeclab%2Fshellcode-resources |
| Reload | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
| Reload | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
| Reload | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
|
alphaSeclab
| https://patch-diff.githubusercontent.com/alphaSeclab |
| shellcode-resources | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
|
Notifications
| https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources |
|
Fork
60
| https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources |
|
Star
216
| https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources |
|
216
stars
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/stargazers |
|
60
forks
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/forks |
|
Branches
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/branches |
|
Tags
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tags |
|
Activity
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/activity |
|
Star
| https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources |
|
Notifications
| https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources |
|
Code
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
|
Issues
0
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/issues |
|
Pull requests
0
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/pulls |
|
Actions
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/actions |
|
Projects
0
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/projects |
|
Security
Uh oh!
There was an error while loading. Please reload this page.
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/security |
| Please reload this page | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
|
Insights
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/pulse |
|
Code
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
|
Issues
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/issues |
|
Pull requests
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/pulls |
|
Actions
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/actions |
|
Projects
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/projects |
|
Security
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/security |
|
Insights
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/pulse |
| Branches | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/branches |
| Tags | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tags |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/branches |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tags |
| 1 Commit | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/commits/master/ |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/commits/master/ |
| history | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tree/master/history |
| history | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tree/master/history |
| Readme.md | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/blob/master/Readme.md |
| Readme.md | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/blob/master/Readme.md |
| Readme_en.md | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/blob/master/Readme_en.md |
| Readme_en.md | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/blob/master/Readme_en.md |
| README | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
| 所有收集类项目 | https://github.com/alphaSeclab/all-my-collection-repos |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#所有收集类项目 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#shellcode |
| English Version | https://github.com/alphaSeclab/shellcode-resources/blob/master/Readme_en.md |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#目录 |
| 开发&&编写 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#046354d96bbc65ade966dc83ff7fe8ef |
| shellen | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#5489b8896792ff75d1e0971597d5829b |
| (1)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#7a69f4fc97964348552acb7c8472f1ab |
| (2)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#e5dc2d01e8279adf30d34066b8c61aaf |
| 漏洞开发 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4f71b3d96ccbb4433cd9582bf6b3b49c |
| (1)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#1578f4dee1f7b9340b7923d72e67ca75 |
| (13)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#76612bdb96657fd5e6c663f76b738619 |
| 编码&&解码 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4137b4aa2b9562fbad4010b40c93c0b8 |
| (9)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#3ab819169565fb2ac49e4a7285b217fd |
| (14)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#1d15b6ffe1202baecee2e63ceb01261c |
| (9) 工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#2aad113ca8fd8b2ce5278b3c73afb637 |
| (56) 文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#ba82bf5ca275733d09434861aa4becf5 |
| 启动&&加载&&注入&&执行 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#b79d65effe22d7dfa216cdfaaede7abd |
| 注入 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#c8f7f9913bbf6ca9ad62b2924a81c5a1 |
| (13)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#270623a2c94dd2e4a342f46262ee8ae1 |
| (34)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#f67fc5d20ddff852419d63d094cb17ba |
| 执行 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4ad7253b703db90d80efccc99da781e5 |
| (1)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#b84580eec0d446e20ed9c774946f9325 |
| (23)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#9cdbcec9e7e4bf040fe9802dc4e1225b |
| (22) 工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#2c78519e8cf84e3863d4c2374ead132f |
| (6) 文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4f9e0536cd4c8b6d7e3597c5c9315df5 |
| 生成 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#c86cc38af95f4ccbc3d082b3883af702 |
| (16)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#20753578295f405b2fee3ae5659ee214 |
| (24)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#102a321d8be34fab263fe0559145b36c |
| 转换 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4d515d3e53e9e4ae1f09bd9f4afc5b5a |
| (11)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#eb5e32922251dc76e85ed094adbcacd9 |
| (3)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#1d87c2031d25482e324e0b3158e46806 |
| 分析 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#9a0361c824e96f82eaec8829d14cf080 |
| 漏洞 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#115b4bfacc38bd2fc9b7fa303b5c58ab |
| (5) 工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#b636936039c6751d5e736ca2e52c8e1a |
| (53) 文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#ae3243cf65f334dd979b7709d6d745d3 |
| BypassXxx | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#2783a12f735d75d4d9dd34aade4e27fd |
| AV | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#68671811bf65fa44f770f9b7bf35edba |
| (5)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#501a34037beb98f8db25e453dc8c6178 |
| (9)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#e4f187de8742002a534b4140989904a4 |
| (5) 工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#8c1f3c12de652e3cb2e2d92d28d762d8 |
| (12) 文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#fa01326b5bfe12e5417c0f4d30146245 |
| ARM | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#82f62a71fbfb0aec18860663d4de5ec2 |
| (2)工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#9ebdbbcde063e2fd71a1f9fef001315a |
| (9)文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#c7014efbebcc4831883c878a9c4b1736 |
| 其他 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#bfaa9390189b5c4ab46ca5631adf3453 |
| 工具 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#16001cb2fae35b722deaa3b9a8e5f4d5 |
| (1) 收集 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#714ed53324dd30fc14a3ca7c02b9fc1c |
| (64) 新添加 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#98d70f3829393b5da364689bc902bab0 |
| (6) 其他 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#d342759bd2543421de29133d9b376df8 |
| 文章 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#7d2b1d324dbfb20c3c6da343e9443a5c |
| (262) 新添加 | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#596105c2fa0590982160279ebd1b1eac |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#开发编写 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#shellen |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具 |
| merrychap/shellen | https://github.com/merrychap/shellen |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章 |
| Shellen:交互式shellcode开发环境 | http://www.freebuf.com/sectool/164387.html |
| [翻译] Shellen-交互式shellcode开发环境 | https://bbs.pediy.com/thread-224810.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#漏洞开发 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-1 |
| sectool/python-shellcode-buffer-overflow | https://github.com/sectool/Python-Shellcode-Buffer-Overflow |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-1 |
| [翻译]Windows漏洞利用开发 - 第4部分:使用跳转定位Shellcode | https://bbs.pediy.com/thread-225847.htm |
| Zero Day Zen Garden: Windows Exploit Development - Part 3 [Egghunter to Locate Shellcode] | https://www.shogunlab.com/blog/2017/09/02/zdzg-windows-exploit-3.html |
| Zero Day Zen Garden: Windows Exploit Development - Part 2 [JMP to Locate Shellcode] | https://www.shogunlab.com/blog/2017/08/26/zdzg-windows-exploit-2.html |
| Exploit Dev 101: Jumping to Shellcode | http://www.abatchy.com/2017/05/jumping-to-shellcode.html |
| Exploiting Weak Shellcode Hashes to Thwart Module Discovery; or, Go Home, Malware, You’re Drunk! | https://www.digitaloperatives.com/2016/06/23/exploiting-weak-shellcode-hashes/ |
| [翻译]Windows Exploit开发系列教程第六部分:WIN32 shellcode编写 | https://bbs.pediy.com/thread-207096.htm |
| [翻译]exploit开发教程第六章-shellcode | https://bbs.pediy.com/thread-206946.htm |
| Avoiding badchars & small buffers with custom shellcode – OdinSecureFTPclient SEH exploit | http://ly0n.me/2015/08/10/avoiding-badchars-small-buffers-with-custom-shellcode-odinsecureftpclient-seh-exploit/ |
| Avoiding badchars & small buffers with custom shellcode – OdinSecureFTPclient SEH exploit | https://paumunoz.tech/2015/08/10/avoiding-badchars-small-buffers-with-custom-shellcode-odinsecureftpclient-seh-exploit/ |
| Exploiting with BeEF Bind shellcode | http://blog.beefproject.com/2014/03/exploiting-with-beef-bind-shellcode_19.html |
| Windows Exploit Development – Part 5: Locating Shellcode With Egghunting | https://www.securitysift.com/windows-exploit-development-part-5-locating-shellcode-egghunting/ |
| Windows Exploit Development – Part 4: Locating Shellcode With Jumps | https://www.securitysift.com/windows-exploit-development-part-4-locating-shellcode-jumps/ |
| [原创]exploit_me_A的shellcode构造与突破 | https://bbs.pediy.com/thread-57561.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#编码解码 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-2 |
| mothran/unicorn-decoder | https://github.com/mothran/unicorn-decoder |
| ecx86/shellcode_encoder | https://github.com/ecx86/shellcode_encoder |
| eteissonniere/elidecode | https://github.com/ETeissonniere/EliDecode |
| ihack4falafel/slink | https://github.com/ihack4falafel/slink |
| blacknbunny/encdecshellcode | https://github.com/blacknbunny/encdecshellcode |
| veritas501/ae64 | https://github.com/veritas501/ae64 |
| anon6372098/faz-shc | https://github.com/anon6372098/faz-shc |
| sh3llc0d3r1337/slae32-custom-encoder | https://github.com/sh3llc0d3r1337/slae32-custom-encoder |
| pcsxcetra/equationeditorshellcodedecoder | https://github.com/pcsxcetra/equationeditorshellcodedecoder |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-2 |
| Metasploit Shellcode Grows Up: Encrypted and Authenticated C Shells | https://blog.rapid7.com/2019/11/21/metasploit-shellcode-grows-up-encrypted-and-authenticated-c-shells/ |
| Shellcode编码技术 | https://xz.aliyun.com/t/6665 |
| A deeper look at Equation Editor CVE-2017-11882 with encoded Shellcode | https://pcsxcetrasupport3.wordpress.com/2019/05/22/a-deeper-look-at-equation-editor-cve-2017-11882-with-encoded-shellcode/ |
| The Lost Art of Shellcode Encoder/Decoders | https://cybersecpolitics.blogspot.com/2019/03/the-lost-art-of-shellcode.html |
| 编写 Shellcode XOR 编码/解码器, 躲避AV检测 | https://www.doyler.net/security-not-included/shellcode-xor-encoder-decoder |
| SLAE:如何开发自定义的RBIX Shellcode编码解码器 | https://www.anquanke.com/post/id/86693/ |
| Building shellcode, egghunters and decoders. | https://www.bigendiansmalls.com/creating-shellcode-to-run-in-uss/ |
| Huffy:哈夫曼编码的shellcode | http://www.freebuf.com/articles/system/59781.html |
| GitS 2015: Huffy (huffman-encoded shellcode) | https://blog.skullsecurity.org/2015/gits-2015-huffy-huffman-encoded-shellcode |
| x64 Shellcode Byte-Rotate Encoder | https://zerosum0x0.blogspot.com/2014/12/x64-shellcode-byte-rotate-encoder.html |
| Building a Decoder for the CVE-2014-0502 Shellcode | https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html |
| Experiment With Run Time Encryption/Decryption of Win32 ShellCodes | http://www.debasish.in/2012/08/experiment-with-run-time.html |
| [原创]shellcode xor编码/解码 | https://bbs.pediy.com/thread-151108.htm |
| [原创]shellcode的一种ascii编码方法 | https://bbs.pediy.com/thread-70964.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-3 |
| reyammer/shellnoob | https://github.com/reyammer/shellnoob |
| thesecondsun/shellab | https://github.com/thesecondsun/shellab |
| jackullrich/shellcodestdio | https://github.com/jackullrich/shellcodestdio |
| lcatro/vuln_javascript | https://github.com/lcatro/vuln_javascript |
| invictus1306/workshop-bsidesmunich2018 | https://github.com/invictus1306/workshop-bsidesmunich2018 |
| shellvm/shellvm | https://github.com/shellvm/shellvm |
| novicelive/shellcoding | https://github.com/novicelive/shellcoding |
| jlxip/shellcode-ide | https://github.com/jlxip/shellcode-ide |
| wanttobeno/study_shellcode | https://github.com/wanttobeno/study_shellcode |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-3 |
| shellcode编写过程总结 | https://xz.aliyun.com/t/7072 |
| Writing shellcodes for Windows x64 | https://nytrosecurity.com/2019/06/30/writing-shellcodes-for-windows-x64/ |
| Windows x86 Shellcode开发:寻找Kernel32.dll地址 | https://www.4hou.com/system/17180.html |
| Writing a Custom Shellcode Encoder | https://medium.com/p/31816e767611 |
| 用ARM编写shellcode | https://xz.aliyun.com/t/4098 |
| Writing shellcode to binary files | http://fuzzysecurity.com/tutorials/7.html |
| Part 6: Writing W32 shellcode | http://fuzzysecurity.com/tutorials/expDev/6.html |
| 过年不屯点干货吗,Windows平台高效Shellcode编程技术实战|精品公开课 | https://www.freebuf.com/fevents/194308.html |
| [BOOK] Shellcode writting in Windows environments | http://ly0n.me/2019/01/03/shellcode-writting-in-windows-environments/ |
| [BOOK] Shellcode writting in Windows environments | https://paumunoz.tech/2019/01/03/shellcode-writting-in-windows-environments/ |
| FreeBSD上编写x86 Shellcode初学者指南 | http://www.4hou.com/binary/14375.html |
| [原创]《0day安全...(第二版)》第3章第4节开发通用的shellcode在win10系统下测试的问题 | https://bbs.pediy.com/thread-246532.htm |
| 路由器漏洞复现终极奥义——基于MIPS的shellcode编写 | https://www.anquanke.com/post/id/153725/ |
| [翻译]二进制漏洞利用(一)编写ARMshellcode&理解系统函数 | https://bbs.pediy.com/thread-230148.htm |
| Windows下Shellcode编写详解 | https://xz.aliyun.com/t/2108 |
| Sickle:推荐一款优质ShellCode开发工具 | http://www.freebuf.com/sectool/162332.html |
| Linux下shellcode的编写 | https://xz.aliyun.com/t/2052 |
| 我的shellcode编写之路 |MSF| Shellcode | kali linux 2017 | http://www.secist.com/archives/4809.html |
| Shellcode编程之特征搜索定位GetProcAddress | https://www.anquanke.com/post/id/86334/ |
| 解决 CTF "b-64-b-tuff":手动编写 base64 解码器及 alphanumeric shellcode | https://blog.skullsecurity.org/2017/solving-b-64-b-tuff-writing-base64-and-alphanumeric-shellcode |
| Windows x64 shellcode编写指南 | https://www.anquanke.com/post/id/86175/ |
| 如何编写高质量的Windows Shellcode | http://www.freebuf.com/articles/system/133990.html |
| [翻译]Windows平台下的Shellcode代码优化编写指引 | https://bbs.pediy.com/thread-217513.htm |
| HEVD 内核攻击: 编写Shellcode(三) | http://www.4hou.com/technology/3942.html |
| shellcode编程:在内存中解析API地址 | https://www.anquanke.com/post/id/85386/ |
| Writing your own shellcode. | https://paraschetal.in/writing-your-own-shellcode |
| Windows平台shellcode开发入门(三) | http://www.freebuf.com/articles/system/97215.html |
| Introduction to Windows shellcode development – Part 3 | https://securitycafe.ro/2016/02/15/introduction-to-windows-shellcode-development-part-3/ |
| Windows平台shellcode开发入门(二) | http://www.freebuf.com/articles/system/94774.html |
| Windows平台shellcode开发入门(一) | http://www.freebuf.com/articles/system/93983.html |
| When Every Byte Counts – Writing Minimal Length Shellcodes | http://securitygossip.com/blog/2016/01/07/2016-01-07/ |
| When Every Byte Counts – Writing Minimal Length Shellcodes | https://loccs.sjtu.edu.cn/gossip/blog/2016/01/07/2016-01-07/ |
| Introduction to Windows shellcode development – Part 2 | https://securitycafe.ro/2015/12/14/introduction-to-windows-shellcode-development-part-2/ |
| Introduction to Windows shellcode development – Part 1 | https://securitycafe.ro/2015/10/30/introduction-to-windows-shellcode-development-part1/ |
| Windows平台下高级Shellcode编程技术 | http://www.freebuf.com/articles/system/58920.html |
| [原创]windows平台下的高级shellcode编程技术 | https://bbs.pediy.com/thread-197835.htm |
| windows平台下高级shellcode编程技术 | http://blog.topsec.com.cn/ad_lab/windows%e5%b9%b3%e5%8f%b0%e4%b8%8b%e5%8a%9f%e8%83%bd%e6%80%a7shellcode%e7%9a%84%e7%bc%96%e5%86%99/ |
| [原创]Masm宏框架 简单编写复杂的ShellCode | https://bbs.pediy.com/thread-191650.htm |
| 使用C编写shellcode | http://www.91ri.org/9057.html |
| [原创]编写二进制的shellcode | https://bbs.pediy.com/thread-182356.htm |
| [原创]PE感染&ShellCode编写技术补充 | https://bbs.pediy.com/thread-172961.htm |
| ShellNoob v1.0 – Shellcode Writing Toolkit | http://www.toolswatch.org/2013/05/shellnoob-v1-0-shellcode-writing-toolkit/ |
| ShellNoob 1.0 - a shellcode writing toolkit | http://reyammer.blogspot.com/2013/04/shellnoob-10-shellcode-writing-toolkit.html |
| [原创]Android系统shellcode编写 | https://bbs.pediy.com/thread-155774.htm |
| shellcode的编写与关键 | http://www.91ri.org/3335.html |
| [原创]MASM之ShellCode框架编写[合并帖] | https://bbs.pediy.com/thread-135062.htm |
| [原创]Win 7下定位kernel32.dll基址及shellcode编写 | https://bbs.pediy.com/thread-122260.htm |
| [翻译]Exploit 编写系列教程第九篇Win32 Shellcode编写入门 | https://bbs.pediy.com/thread-120649.htm |
| Writing OS Independent Shellcode | https://blog.elearnsecurity.com/writing-os-independent-shellcode.html |
| [原创]Writing JIT-Spray Shellcode for fun and profit - CHS[更新完整版] | https://bbs.pediy.com/thread-108861.htm |
| [原创]编写反连ShellCode遇到的难点并解决之总结 | https://bbs.pediy.com/thread-105567.htm |
| [翻译]Exploit编写系列教程第二篇: 栈溢出——跳至shellcode | https://bbs.pediy.com/thread-101704.htm |
| Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode | https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/ |
| [翻译]写一段小型溢出代码(译自:Writing Small Shellcode) | https://bbs.pediy.com/thread-80306.htm |
| [原创]ShellCode编写之hash式函数调用及相关 | https://bbs.pediy.com/thread-58393.htm |
| [原创]VC8编写ShellCode以及辅助工具 | https://bbs.pediy.com/thread-28681.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#启动加载注入执行 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#注入 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-4 |
| gpoulios/ropinjector | https://github.com/gpoulios/ropinjector |
| josh0xa/threadboat | https://github.com/josh0xA/ThreadBoat |
| countercept/doublepulsar-usermode-injector | https://github.com/countercept/doublepulsar-usermode-injector |
| sensepost/anapickle | https://github.com/sensepost/anapickle |
| psychomario/pyinject | https://github.com/psychomario/pyinject |
| borjamerino/tlsinjector | https://github.com/borjamerino/tlsinjector |
| taroballzchen/shecodject | https://github.com/TaroballzChen/shecodject |
| binject/shellcode | https://github.com/binject/shellcode |
| jorik041/cymothoa | https://github.com/jorik041/cymothoa |
| michaelburge/redshift-shellcode | https://github.com/michaelburge/redshift-shellcode |
| chango77747/shellcodeinjector_msbuild | https://github.com/chango77747/shellcodeinjector_msbuild |
| egebalci/injector | https://github.com/egebalci/injector |
| xiaobo93/unmodule_shellcode_inject | https://github.com/xiaobo93/unmodule_shellcode_inject |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-4 |
| 手工shellcode注入PE文件 | https://xz.aliyun.com/t/6939 |
| 代码注入技术之Shellcode注入 | https://www.4hou.com/web/21784.html |
| Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection | https://www.youtube.com/watch?v=XnN_UWfHlNM |
| 在遇到shellcode注入进程时所使用的调试技 | https://www.freebuf.com/articles/system/212248.html |
| 远程进程shellcode注入调试技巧 | https://www.4hou.com/system/19852.html |
| Arm平台Ptrace注入shellcode技术 | https://www.anquanke.com/post/id/179985/ |
| [原创]代替创建用户线程使用ShellCode注入DLL的小技巧 | https://bbs.pediy.com/thread-247515.htm |
| [分享]绝对牛逼哄哄的shellcode内存注入,支持64,32,远程内存注入,支持VMP壳最大强度保护 | https://bbs.pediy.com/thread-246934.htm |
| sRDI:一款通过Shellcode实现反射型DLL注入的强大工具 | http://www.freebuf.com/sectool/181426.html |
| PowerShell Shellcode Injection on Win 10 (v1803) | https://blog.cobaltstrike.com/2018/05/24/powershell-shellcode-injection-on-win-10-v1803/ |
| Shecodject – Autoscript for Shellcode Injection | https://pentesttoolz.com/2017/12/30/shecodject-autoscript-for-shellcode-injection/ |
| Malware Analysis - ROKRAT Unpacking from Injected Shellcode | https://www.youtube.com/watch?v=uoBQE5s2ba4 |
| Metasploit自动化Bypass Av脚本:Shecodject X Shellcode Injection | http://www.freebuf.com/sectool/154356.html |
| [原创]通过Wannacry分析内核shellcode注入dll技术 | https://bbs.pediy.com/thread-221756.htm |
| sRDI – Shellcode Reflective DLL Injection | https://silentbreaksecurity.com/srdi-shellcode-reflective-dll-injection/ |
| Shellcode Injection | https://dhavalkapil.com/blogs/Shellcode-Injection/ |
| Dynamic Shellcode Injection: Shellter | https://n0where.net/dynamic-shellcode-injection-shellter |
| Kali Shellter 5.1:动态ShellCode注入工具 绕过安全软件 | http://www.freebuf.com/sectool/81955.html |
| Injecting Shellcode into a Remote Process with Python | https://www.christophertruncer.com/injecting-shellcode-into-a-remote-process-with-python/ |
| [原创]纯C++编写Win32/X64通用Shellcode注入csrss进程. | https://bbs.pediy.com/thread-203140.htm |
| BSidesLisbon2015 - Shellter - A dynamic shellcode injector - Kyriakos Economou | https://www.youtube.com/watch?v=TunWNHYrWp8 |
| 动态Shellcode注入工具 – Shellter | http://www.freebuf.com/sectool/71230.html |
| TLS Injector: running shellcodes through TLS callbacks | http://www.shelliscoming.com/2015/06/tls-injector-running-shellcodes-through.html |
| Shellter v1.7 A Dynamic ShellCode Injector – Released | http://www.toolswatch.org/2014/08/shellter-v1-7-a-dynamic-shellcode-injector-released/ |
| [New Tool] Shellter v1.0 A Dynamic ShellCode Injector – Released | http://www.toolswatch.org/2014/06/new-tool-shellter-v1-0-a-dynamic-shellcode-injector-released/ |
| Injecting Shellcode into a Portable Executable(PE) using Python | http://www.debasish.in/2013/06/injecting-shellcode-into-portable.html |
| Native PowerShell x86 Shellcode Injection on 64-bit Platforms | https://www.trustedsec.com/2013/05/native-powershell-x86-shellcode-injection-on-64-bit-platforms/ |
| [原创]内核ShellCode注入的一种方法 | https://bbs.pediy.com/thread-170959.htm |
| Cymothoa – Runtime shellcode injection Backdoors | http://www.hackingarticles.in/cymothoa-runtime-shellcode-injection-for-stealthy-backdoors/ |
| PyInjector Shellcode Injection attack on Remote PC using Social Engineering Toolkit | http://www.hackingarticles.in/pyinjector-shellcode-injection-attack-on-remote-windows-pc-using-social-engineering-toolkit/ |
| New tool PyInjector Released – Python Shellcode Injection | https://www.trustedsec.com/2012/08/new-tool-pyinjector-released-python-shellcode-injection/ |
| Syringe utility provides ability to inject shellcode into processes | https://firebitsbr.wordpress.com/2011/07/08/syringe-utility-provides-ability-to-inject-shellcode-into-processes/ |
| 《The Shellcoder's handbook》第十四章_故障注入 | https://bbs.pediy.com/thread-38713.htm |
| [原创]ShellCode的另外一种玩法(远程线程注入ShellCode) | https://bbs.pediy.com/thread-21123.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#执行 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-5 |
| dimopouloselias/simpleshellcodeinjector | https://github.com/dimopouloselias/simpleshellcodeinjector |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-5 |
| Windows shellcode执行技术入门指南 | https://www.4hou.com/web/19758.html |
| A Beginner’s Guide to Windows Shellcode Execution Techniques | https://www.contextis.com/en/blog/a-beginners-guide-to-windows-shellcode-execution-techniques |
| Dynamic Shellcode Execution | https://countercept.com/blog/dynamic-shellcode-execution/ |
| Dynamic Shellcode Execution | https://countercept.com/our-thinking/dynamic-shellcode-execution/ |
| 投稿文章:Bypass Applocker + 免杀执行任意 shellcode [ csc + installUtil ] | https://www.t00ls.net/articles-49443.html |
| ShellCode执行代码iptables -P INPUT ACCEPT | http://www.91ri.org/17267.html |
| 使Windows Loader直接执行ShellCode,IDA载入文件时崩溃,而且绕过大多数杀软。 | https://osandamalith.com/2017/04/11/executing-shellcode-directly/ |
| 利用原生Windows函数执行shellcode | https://www.anquanke.com/post/id/85372/ |
| Office Shellcode Execution | https://evi1cg.me/archives/Office_Shellcode_Execution.html |
| 宏病毒利用EnumDateFormats执行Shellcode创建傀进程绕杀软 | https://tav.qq.com/index/newsDetail/260.html |
| CallWindowProc被宏病毒利用来执行Shellcode | https://www.anquanke.com/post/id/84433/ |
| Shellcode: Execute command for x32/x64 Linux / Windows / BSD | https://modexp.wordpress.com/2016/06/04/winux/ |
| Shellcodes: Executing Windows and Linux Shellcodes | https://modexp.wordpress.com/2016/03/28/winux-shellcodes/ |
| Executing Shellcode with Python | https://www.doyler.net/security-not-included/executing-shellcode-with-python |
| BSidesCHS 2013 - Session 02 - Java Shellcode Execution | https://www.youtube.com/watch?v=oVT4khoSYBU |
| [原创]从内核在WOW64进程中执行用户态shellcode | https://bbs.pediy.com/thread-190596.htm |
| Hide meterpreter shellcode in executable | https://blog.sevagas.com/?Hide-meterpreter-shellcode-in-executable |
| 利用vbs优雅的执行shellcode | http://www.freebuf.com/articles/web/11662.html |
| HunnyBunny: Execute any shellcode on the | https://y0nd13.blogspot.com/2013/02/hunnybunny-execute-any-shellcode-on-the.html |
| Execute ShellCode Using Python | http://www.debasish.in/2012/04/execute-shellcode-using-python.html |
| Shellcode分段执行技术原理 | http://riusksk.me/2010/12/23/shellcode-split/ |
| [原创]从执行流程看shellcode(一)[附源代码] | https://bbs.pediy.com/thread-82327.htm |
| [求助]第五章的通用shellcode在password.txt中始终无法正常执行令我好生头痛 | https://bbs.pediy.com/thread-79704.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-6 |
| inquisb/shellcodeexec | https://github.com/inquisb/shellcodeexec |
| clinicallyinane/shellcode_launcher | https://github.com/clinicallyinane/shellcode_launcher |
| pyana/pyana | https://github.com/pyana/pyana |
| brimstone/go-shellcode | https://github.com/brimstone/go-shellcode |
| peterferrie/win-exec-calc-shellcode | https://github.com/peterferrie/win-exec-calc-shellcode |
| coldzer0/cmulator | https://github.com/coldzer0/cmulator |
| arno0x/dnsdelivery | https://github.com/arno0x/dnsdelivery |
| zerosum0x0/runshellcode | https://github.com/zerosum0x0/runshellcode |
| rvrsh3ll/cplresourcerunner | https://github.com/rvrsh3ll/cplresourcerunner |
| fireeye/flare-kscldr | https://github.com/fireeye/flare-kscldr |
| enigma0x3/powershell-payload-excel-delivery | https://github.com/enigma0x3/powershell-payload-excel-delivery |
| emptymonkey/drinkme | https://github.com/emptymonkey/drinkme |
| zerosum0x0/shellcodedriver | https://github.com/zerosum0x0/shellcodedriver |
| sisoma2/shellcodeloader | https://github.com/sisoma2/shellcodeloader |
| userexistserror/dllloadershellcode | https://github.com/userexistserror/dllloadershellcode |
| n1nj4sec/pymemimporter | https://github.com/n1nj4sec/pymemimporter |
| eik00d/reverse_dns_shellcode | https://github.com/eik00d/reverse_dns_shellcode |
| thomaskeck/pyshellcode | https://github.com/thomaskeck/pyshellcode |
| 0xyg3n/mem64 | https://github.com/0xyg3n/mem64 |
| naxalpha/shellcode-loader | https://github.com/naxalpha/shellcode-loader |
| samvartaka/triton_analysis | https://github.com/samvartaka/triton_analysis |
| brimstone/shellload | https://github.com/brimstone/shellload |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-6 |
| 一个可以动态分析恶意软件的工具——Kernel Shellcode Loader | http://www.4hou.com/technology/11235.html |
| 内核中加载Shellcode: 实例、方法与工具 | http://www.fireeye.com/blog/threat-research/2018/04/loading-kernel-shellcode.html |
| [翻译]Windows内核ShellCode的动态加载和调试 | https://bbs.pediy.com/thread-218779.htm |
| 如何从猫咪图片中加载运行shellcode | https://www.anquanke.com/post/id/85824/ |
| Shellcode: Fido and how it resolves GetProcAddress and LoadLibraryA | https://modexp.wordpress.com/2017/02/03/shellcode-iat/ |
| Writing a download and exec shellcode | https://govolution.wordpress.com/2014/02/02/writing-a-download-and-exec-shellcode/ |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#生成 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-7 |
| thewover/donut | https://github.com/thewover/donut |
| r00t-3xp10it/venom | https://github.com/r00t-3xp10it/venom |
| nytrorst/shellcodecompiler | https://github.com/nytrorst/shellcodecompiler |
| zdresearch/owasp-zsc | https://github.com/zdresearch/OWASP-ZSC |
| gdelugre/shell-factory | https://github.com/gdelugre/shell-factory |
| alexpark07/armscgen | https://github.com/alexpark07/armscgen |
| hatriot/shellme | https://github.com/hatriot/shellme |
| veil-framework/veil-ordnance | https://github.com/veil-framework/veil-ordnance |
| karttoon/trigen | https://github.com/karttoon/trigen |
| 3gstudent/shellcode-generater | https://github.com/3gstudent/shellcode-generater |
| rh0dev/shellcode2asmjs | https://github.com/rh0dev/shellcode2asmjs |
| zdresearch/zcr-shellcoder-archive | https://github.com/zdresearch/zcr-shellcoder-archive |
| hoodoer/enneos | https://github.com/hoodoer/enneos |
| clonemerge/shellgen | https://github.com/CloneMerge/ShellGen |
| thepisode/linux-shellcode-generator | https://github.com/thepisode/linux-shellcode-generator |
| ins1gn1a/woollymammoth | https://github.com/ins1gn1a/woollymammoth |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-7 |
| 生成可打印的shellcode | https://xz.aliyun.com/t/5662 |
| Shellcode生成工具Donut测试分析 | https://www.4hou.com/technology/19123.html |
| Shellcode生成工具Donut测试分析 | https://3gstudent.github.io/3gstudent.github.io/Shellcode%E7%94%9F%E6%88%90%E5%B7%A5%E5%85%B7Donut%E6%B5%8B%E8%AF%95%E5%88%86%E6%9E%90/ |
| Generating Shellcode With Msfvenom | https://www.youtube.com/watch?v=nNt_gRl8RBk |
| [原创] 抛砖引玉之gcc生成可可携带字符串的shellcode | https://bbs.pediy.com/thread-247138.htm |
| Execve Shellcode – Includes Arguments and Generator! | https://www.doyler.net/security-not-included/execve-shellcode-generator |
| [原创]简陋的小工具:DWORD数组形式拷贝shellcode内容;裸函数生成 | https://bbs.pediy.com/thread-225030.htm |
| VENOM 1.0.15 – Metasploit Shellcode Generator/Compiler/Listener | https://pentesttoolz.com/2018/02/11/venom-1-0-15-metasploit-shellcode-generator-compiler-listener/ |
| 在线版 混淆字符串/Shellcode 生成器 | https://zerosum0x0.blogspot.com/2017/08/obfuscatedencrypted-cc-online-string.html |
| [原创]开源ShellCode生成引擎 | https://bbs.pediy.com/thread-219956.htm |
| SynesthesiaYS 介绍 | http://www.msreverseengineering.com/blog/2017/7/15/the-synesthesia-shellcode-generator-code-release-and-future-directions |
| ROT-N Shellcode Encoder/Generator (Linux x86) | http://www.abatchy.com/2017/05/rot-n-shellcode-encoder-linux-x86 |
| 生成自己的Alphanumeric/Printable shellcode | https://www.anquanke.com/post/id/85871/ |
| Windows Shellcode学习笔记——通过VisualStudio生成shellcode | http://www.4hou.com/technology/3335.html |
| Shellcode Generation, Manipulation, and Injection in Python 3 | https://www.christophertruncer.com/shellcode-manipulation-and-injection-in-python-3/ |
| Windows Shellcode学习笔记——通过VisualStudio生成shellcode | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E9%80%9A%E8%BF%87VisualStudio%E7%94%9F%E6%88%90shellcode/ |
| Windows Shellcode学习笔记——通过VisualStudio生成shellcode | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E9%80%9A%E8%BF%87VisualStudio%E7%94%9F%E6%88%90shellcode/ |
| Exploitation of Windows PC using Venom: Shellcode Generator | http://www.hackingarticles.in/exploitation-of-windows-pc-using-venom-shellcode-generator/ |
| 工具推荐:Shellsploit,ShellCode生成器 | http://www.freebuf.com/sectool/95039.html |
| Shellcode Generator: Venom | https://n0where.net/shellcode-generator-venom |
| Null Free Windows WinExec Shellcode & Tool for generating Payload | https://govolution.wordpress.com/2015/02/07/one-for-all-null-free-windows-winexec-shellcode-tool-for-generating-payload/ |
| How to generate shellcode from custom exe in metasploit | http://securityblog.gr/2144/how-to-generate-shellcode-from-custom-exe-in-metasploit/ |
| phpcodegen-library[php生成shellcode函数库] | http://www.freebuf.com/sectool/1941.html |
| [原创]生成一个关于URLDownloadToFile的shellcode机器码 | https://bbs.pediy.com/thread-55326.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#转换 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-8 |
| monoxgas/srdi | https://github.com/monoxgas/srdi |
| hasherezade/pe_to_shellcode | https://github.com/hasherezade/pe_to_shellcode |
| blacknbunny/shellcode2assembly | https://github.com/blacknbunny/shellcode2assembly |
| w1nds/dll2shellcode | https://github.com/w1nds/dll2shellcode |
| 5loyd/makecode | https://github.com/5loyd/makecode |
| after1990s/pe2shellcode | https://github.com/after1990s/pe2shellcode |
| davinci13/exe2shell | https://github.com/davinci13/exe2shell |
| gnebbia/shellcoder | https://github.com/gnebbia/shellcoder |
| giantbranch/convert-c-javascript-shellcode | https://github.com/giantbranch/convert-c-javascript-shellcode |
| hamza-megahed/binary2shellcode | https://github.com/hamza-megahed/binary2shellcode |
| yatebyalubaluniyat/rawshellcode2exe | https://github.com/yatebyalubaluniyat/rawshellcode2exe |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-8 |
| [原创]【Python】使用Python将Shellcode转换成汇编 | https://bbs.pediy.com/thread-222965.htm |
| 如何把shellcode转换成exe文件分析 | http://www.freebuf.com/articles/web/152879.html |
| Converting Shellcode to Portable Executable (32- and 64- bit) | http://www.hexacorn.com/blog/2015/12/10/converting-shellcode-to-portable-executable-32-and-64-bit/ |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#分析 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#漏洞 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-9 |
| rootlabs/smap | https://github.com/suraj-root/smap |
| oalabs/blobrunner | https://github.com/oalabs/blobrunner |
| dungtv543/dutas | https://github.com/dungtv543/dutas |
| adamkramer/jmp2it | https://github.com/adamkramer/jmp2it |
| debasishm89/qhook | https://github.com/debasishm89/qhook |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-9 |
| Building A Custom Tool For Shellcode Analysis | https://www.sentinelone.com/blog/building-a-custom-tool-for-shellcode-analysis/ |
| Xori:一款针对PE32和Shellcode的自动化反编译与静态分析库 | https://www.freebuf.com/sectool/199629.html |
| "VelvetSweatshop" Maldocs: Shellcode Analysis | https://isc.sans.edu/forums/diary/VelvetSweatshop+Maldocs+Shellcode+Analysis/24776/ |
| 对某HWP漏洞样本的shellcode分析 | https://www.anquanke.com/post/id/169872/ |
| BlueHat v18 || Linear time shellcode detection using state machines and operand analysis on the runtime | https://www.slideshare.net/MSbluehat/bluehat-v18-linear-time-shellcode-detection-using-state-machines-and-operand-analysis-on-the-runtime |
| Analyzing Encoded Shellcode with scdbg, (Mon, Sep 24th) | https://www.ironcastle.net/analyzing-encoded-shellcode-with-scdbg-mon-sep-24th/ |
| Analyzing Encoded Shellcode with scdbg | https://isc.sans.edu/forums/diary/Analyzing+Encoded+Shellcode+with+scdbg/24134/ |
| Using scdbg to analyze shellcode | https://www.youtube.com/watch?v=SHgIVMVnP0w |
| Video: Using scdbg to analyze shellcode, (Sat, Sep 8th) | https://www.ironcastle.net/video-using-scdbg-to-analyze-shellcode-sat-sep-8th/ |
| Another quickie: Using scdbg to analyze shellcode | https://isc.sans.edu/forums/diary/Another+quickie+Using+scdbg+to+analyze+shellcode/24058/ |
| Metasploit Shellcode Analysis – read_file via ndisasm (SLAE Exam #5.1) | https://www.doyler.net/security-not-included/metasploit-shellcode-analysis |
| Analyzing Shellcode of GrandSoft's CVE-2018-8174 | https://www.nao-sec.org/2018/06/analyzing-shellcode-of-grandsofts-cve.html |
| [原创]od逆向分析栈溢出shellcode | https://bbs.pediy.com/thread-226476.htm |
| Analyzing compressed shellcode | https://isc.sans.edu/forums/diary/Analyzing+compressed+shellcode/23335/ |
| EternalBlue Shellcode详细分析 | https://www.anquanke.com/post/id/86392/ |
| NSA武器库:DoublePulsar初始SMB后门shellcode分析 | https://www.anquanke.com/post/id/86112/ |
| NSA武器库:DoublePulsar初始SMB后门shellcode分析 | https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html |
| Episode 3 – Shellcode Analysis with APITracker | https://cysinfo.com/episode-3-shellcode-analysis-apitracker/ |
| 恶意文档分析:从宏指令到Shellcode | https://www.anquanke.com/post/id/85147/ |
| Hancitor Maldoc: Shellcode Dynamic Analysis | https://www.youtube.com/watch?v=N9fqJ0DYs0g |
| Dynamic shellcode analysis | http://www.miasm.re/blog/2016/02/12/dynamic_shellcode_analysis.html |
| Shellcode分析工具PyAna | http://www.freebuf.com/sectool/92990.html |
| Hacking Team Mac OSX 64位 Shellcode 技术分析 | https://security.tencent.com/index.php/blog/msg/89 |
| Hacking Team 武器库研究(五):Mac OSX 64位 Shellcode 技术分析 | http://riusksk.me/2015/07/15/Hacking-Team-%E6%AD%A6%E5%99%A8%E5%BA%93%E7%A0%94%E7%A9%B6%EF%BC%88%E4%BA%94%EF%BC%89%EF%BC%9AMac-OSX-64%E4%BD%8D-Shellcode-%E6%8A%80%E6%9C%AF%E5%88%86%E6%9E%90/ |
| [原创]格盘的shellcode分析 | https://bbs.pediy.com/thread-201485.htm |
| [原创]解析coff文件之提取shellcode代码 | https://bbs.pediy.com/thread-198188.htm |
| Diving into a Silverlight Exploit and Shellcode – Analysis and Techniques | Check Point Software Blog | https://blog.checkpoint.com/2015/01/08/diving-into-a-silverlight-exploit-and-shellcode-analysis-and-techniques-3/ |
| Analyzing Shellcode Extracted from Malicious RTF Documents | https://digital-forensics.sans.org/blog/2014/12/23/analyzing-shellcode-extracted-from-malicious-rtf-other-documents |
| 某EXCEL漏洞样本shellcode分析 | http://blog.jowto.com/?p=81 |
| RIG Exploit Kit - Shellcode analysis | http://thembits.blogspot.com/2014/12/rig-exploit-kit-shellcode-analysis.html |
| Adventures with Radare2 #1: A Simple Shellcode Analysis | http://radare.today/posts/adventures-with-radare2-1-a-simple-shellcode-analysis/ |
| Adventures with Radare2 #1: A Simple Shellcode Analysis | https://radareorg.github.io/blog/posts/adventures-with-radare2-1-a-simple-shellcode-analysis/ |
| [原创]一段 shellcode 代码的分析 | https://bbs.pediy.com/thread-190214.htm |
| SLAE Assignment 5: Shellcode Analysis | https://govolution.wordpress.com/2014/01/24/slae-assignment-5-shellcode-analysis/ |
| [原创]简单Shellcode的详细分析 | https://bbs.pediy.com/thread-142689.htm |
| 한글 제로데이 쉘코드 간략 분석 (Quick analyzing HanGul 0day shellcode) | https://beistlab.wordpress.com/2011/09/27/hangul_0day_is_used_for_targeted_attacks/ |
| [原创]POC分析助手-ShellcodeDumper | https://bbs.pediy.com/thread-131265.htm |
| [原创]一个word溢出样本的shellcode分析 | https://bbs.pediy.com/thread-130249.htm |
| [原创]CVE-2006-2389漏洞shellcode解析 | https://bbs.pediy.com/thread-121380.htm |
| [原创]CVE-2010-1297漏洞shellcode简析 | https://bbs.pediy.com/thread-121236.htm |
| Crypto-Analysis in Shellcode Detection | https://www.forcepoint.com/blog/security-labs/crypto-analysis-shellcode-detection |
| PDF file loader to extract and analyse shellcode | http://www.hexblog.com/?p=110 |
| [原创]windows下的shellcode剖析浅谈 | https://bbs.pediy.com/thread-99007.htm |
| Shellcode Analysis via MSEC Debugger Extensions | https://msrc-blog.microsoft.com/2009/06/05/shellcode-analysis-via-msec-debugger-extensions/ |
| Ossim: Shellcode Detection and Analysis | https://www.alienvault.com/blogs/labs-research/ossim-shellcode-detection-and-analysis |
| [原创]一个word溢出样本ShellCode的分析 | https://bbs.pediy.com/thread-75517.htm |
| Static analysis of Shellcode - Part 2 | https://isc.sans.edu/forums/diary/Static+analysis+of+Shellcode+Part+2/4972/ |
| Static analysis of Shellcode | https://isc.sans.edu/forums/diary/Static+analysis+of+Shellcode/4970/ |
| [原创]flash漏洞所用shellcode的分析 | https://bbs.pediy.com/thread-65907.htm |
| [技术专题]软件漏洞分析入门_6_初级shellcode_定位缓冲区 | https://bbs.pediy.com/thread-56755.htm |
| [原创]一份shellcode的详细分析 | https://bbs.pediy.com/thread-46068.htm |
| Shellcode Analysis | http://www.msreverseengineering.com/blog/2014/6/22/shellcode-analysis |
| [原创]用softice对doc捆绑木马或exe文件的程序的shellcode分析 | https://bbs.pediy.com/thread-34664.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#bypassxxx |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#av |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-10 |
| hackplayers/salsa-tools | https://github.com/hackplayers/salsa-tools |
| mr-un1k0d3r/unibyav | https://github.com/mr-un1k0d3r/unibyav |
| arno0x/shellcodewrapper | https://github.com/arno0x/shellcodewrapper |
| hvqzao/foolavc | https://github.com/hvqzao/foolavc |
| k8gege/scrun | https://github.com/k8gege/scrun |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-10 |
| 远控免杀从入门到实践(8)-shellcode免杀实践 | https://www.freebuf.com/articles/system/228233.html |
| 那些shellcode免杀总结 | https://xz.aliyun.com/t/7170 |
| shellcode加密过杀软 | https://xz.aliyun.com/t/6995 |
| 绕过杀软:通过网络接收ShellCode的无文件攻击方式与检测方法 | https://www.4hou.com/technology/16845.html |
| 使用名为 Maru 的哈希函数创建permutable API hash,逃避杀软检测 | https://modexp.wordpress.com/2017/08/05/shellcode-maru-hash/ |
| 免杀的艺术:史上最全的汇编Shellcode的技巧(三) | http://www.4hou.com/technology/3893.html |
| 反检测的艺术(Part 3:Shellcode Alchemy) | https://pentest.blog/art-of-anti-detection-3-shellcode-alchemy/ |
| 使用shellcode打造MSF免杀payload | http://www.91ri.org/14240.html |
| encode msf shellcode绕过杀毒 | http://www.91ri.org/6877.html |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-11 |
| cryptolok/morphaes | https://github.com/cryptolok/morphaes |
| infosecn1nja/maliciousmacromsbuild | https://github.com/infosecn1nja/maliciousmacromsbuild |
| rvn0xsy/cooolis-ms | https://github.com/rvn0xsy/cooolis-ms |
| fireeye/duedlligence | https://github.com/fireeye/duedlligence |
| manojcode/foxit-reader-rce-with-virualalloc-and-shellcode-for-cve-2018-9948-and-cve-2018-9958 | https://github.com/manojcode/foxit-reader-rce-with-virualalloc-and-shellcode-for-cve-2018-9948-and-cve-2018-9958 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-11 |
| 红蓝对抗之如何利用Shellcode来躲避安全检测 | https://www.freebuf.com/articles/system/216742.html |
| 如何利用OOB数据绕过防火墙对shellcode的拦截 | https://www.anquanke.com/post/id/173610/ |
| [翻译]English Shellcode - 散文化Shellcode - 绕过对有效载荷的静态检测的思路 | https://bbs.pediy.com/thread-229634.htm |
| [原创][原创]给shellcode找块福地- 通过VDSO绕过PXN | https://bbs.pediy.com/thread-220057.htm |
| Windows Shellcode学习笔记——利用VirtualAlloc绕过DEP | http://www.4hou.com/technology/4093.html |
| Windows Shellcode学习笔记——通过VirtualProtect绕过DEP | http://www.4hou.com/technology/3943.html |
| Windows Shellcode学习笔记——利用VirtualAlloc绕过DEP | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E5%88%A9%E7%94%A8VirtualAlloc%E7%BB%95%E8%BF%87DEP/ |
| Windows Shellcode学习笔记——利用VirtualAlloc绕过DEP | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E5%88%A9%E7%94%A8VirtualAlloc%E7%BB%95%E8%BF%87DEP/ |
| Windows Shellcode学习笔记——通过VirtualProtect绕过DEP | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E9%80%9A%E8%BF%87VirtualProtect%E7%BB%95%E8%BF%87DEP/ |
| Windows Shellcode学习笔记——通过VirtualProtect绕过DEP | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E9%80%9A%E8%BF%87VirtualProtect%E7%BB%95%E8%BF%87DEP/ |
| [原创]一种反检测的Shellcode GetPC方法Flush GetPC | https://bbs.pediy.com/thread-154689.htm |
| Bypassing EMET’s EAF with custom shellcode using kernel pointer | http://www.greyhathacker.net/?p=483 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#arm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-12 |
| odzhan/shellcode | https://github.com/odzhan/shellcode |
| therealsaumil/arm_shellcode | https://github.com/therealsaumil/arm_shellcode |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-12 |
| #HITB2019AMS D1T1 - Make ARM Shellcode Great Again - Saumil Shah | https://www.youtube.com/watch?v=c_jUELOScLc |
| Shellcode for IoT: A Password-Protected Reverse Shell (Linux/ARM) | https://medium.com/p/a18fcda4853b |
| Why is My Perfectly Good Shellcode Not Working?: Cache Coherency on MIPS and ARM | https://blog.senr.io/blog/why-is-my-perfectly-good-shellcode-not-working-cache-coherency-on-mips-and-arm |
| Hack.lu 2018: Make ARM Shellcode Great Again - Saumil Udayan Shah | https://www.youtube.com/watch?v=9tx293lbGuc |
| ARM 汇编初学者指南 | https://modexp.wordpress.com/2018/02/04/arm-crypto/ |
| Shellcode: Linux ARM (AArch64) | https://modexp.wordpress.com/2017/09/11/shellcode-linux-aarch64/ |
| Shellcode: Linux ARM Thumb mode | https://modexp.wordpress.com/2017/09/09/shellcode-linux-arm-thumb/ |
| [1608.03415] ARMv8 Shellcodes from 'A' to 'Z' | https://arxiv.org/abs/1608.03415 |
| Getting Shellcode from ARM Binaries | https://osandamalith.com/2015/07/02/getting-shellcode-from-arm-binaries/ |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#其他 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-13 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#收集 |
| nullsecuritynet/tools | https://github.com/nullsecuritynet/tools |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#新添加 |
| mattifestation/pic_bindshell | https://github.com/mattifestation/pic_bindshell |
| secretsquirrel/fido | https://github.com/secretsquirrel/fido |
| ixty/xarch_shellcode | https://github.com/ixty/xarch_shellcode |
| kgretzky/python-x86-obfuscator | https://github.com/kgretzky/python-x86-obfuscator |
| osirislab/shellcode | https://github.com/osirislab/Shellcode |
| tombkeeper/shellcode_template_in_c | https://github.com/tombkeeper/shellcode_template_in_c |
| mariovilas/shellcode_tools | https://github.com/mariovilas/shellcode_tools |
| zznop/pop-nedry | https://github.com/zznop/pop-nedry |
| scorchsecurity/systorm | https://github.com/scorchsecurity/systorm |
| ohjeongwook/shellcodeemulator | https://github.com/ohjeongwook/shellcodeemulator |
| djhohnstein/scatterbrain | https://github.com/djhohnstein/scatterbrain |
| k2/admmutate | https://github.com/k2/admmutate |
| buffer/libemu | https://github.com/buffer/libemu |
| devzero2000/shellcoderhandbook | https://github.com/devzero2000/shellcoderhandbook |
| t00sh/assembly | https://github.com/t00sh/assembly |
| p0cl4bs/shellcodes | https://github.com/p0cl4bs/shellcodes |
| offsecginger/pythonaesobfuscate | https://github.com/offsecginger/pythonaesobfuscate |
| hellman/shtest | https://github.com/hellman/shtest |
| laginimaineb/waroftheworlds | https://github.com/laginimaineb/waroftheworlds |
| desword/shellcode_tools | https://github.com/desword/shellcode_tools |
| sh3llc0d3r1337/windows_reverse_shell_1 | https://github.com/sh3llc0d3r1337/windows_reverse_shell_1 |
| mortenschenk/token-stealing-shellcode | https://github.com/mortenschenk/token-stealing-shellcode |
| csandker/inmemoryshellcode | https://github.com/csandker/inmemoryshellcode |
| skybulk/bin2sc | https://github.com/skybulk/bin2sc |
| mipu94/broids_unicorn | https://github.com/mipu94/broids_unicorn |
| hacksysteam/shellcodeofdeath | https://github.com/hacksysteam/shellcodeofdeath |
| embedi/tcl_shellcode | https://github.com/embedi/tcl_shellcode |
| ufrisk/shellcode64 | https://github.com/ufrisk/shellcode64 |
| osandamalith/shellcodes | https://github.com/osandamalith/shellcodes |
| rootkitsmm/winio-vidix | https://github.com/rootkitsmm/winio-vidix |
| tophertimzen/shellcodetester | https://github.com/tophertimzen/shellcodetester |
| zerosum0x0/slae64 | https://github.com/zerosum0x0/slae64 |
| zerosteiner/crimson-forge | https://github.com/zerosteiner/crimson-forge |
| osandamalith/vbshellcode | https://github.com/osandamalith/vbshellcode |
| danielhenrymantilla/shellcode-factory | https://github.com/danielhenrymantilla/shellcode-factory |
| pinkp4nther/shellcodes | https://github.com/pinkp4nther/shellcodes |
| m0rv4i/ridgway | https://github.com/m0rv4i/ridgway |
| bruce30262/x86_shellcode_tutorial | https://github.com/bruce30262/x86_shellcode_tutorial |
| hamza-megahed/pentest-with-shellcode | https://github.com/hamza-megahed/pentest-with-shellcode |
| compilepeace/kaal_bhairav | https://github.com/compilepeace/kaal_bhairav |
| nullarray/shellware | https://github.com/nullarray/shellware |
| egebalci/selfdefense | https://github.com/EgeBalci/SelfDefense |
| 1project/scanr | https://github.com/1project/scanr |
| hc0d3r/scdump | https://github.com/hc0d3r/scdump |
| eahlstrom/ucui-unicorn | https://github.com/eahlstrom/ucui-unicorn |
| breaktoprotect/shellcarver | https://github.com/breaktoprotect/shellcarver |
| hoainam1989/shellcode | https://github.com/hoainam1989/shellcode |
| mortenschenk/acl_edit | https://github.com/mortenschenk/acl_edit |
| lnslbrty/bufflow | https://github.com/lnslbrty/bufflow |
| degrigis/exploitation | https://github.com/degrigis/exploitation |
| govolution/win32shellcode | https://github.com/govolution/win32shellcode |
| theevilbit/shellcode | https://github.com/theevilbit/shellcode |
| govolution/moreshellcode | https://github.com/govolution/moreshellcode |
| hamza-megahed/shellcode | https://github.com/hamza-megahed/shellcode |
| orf53975/rig-exploit-for-cve-2018-8174 | https://github.com/orf53975/rig-exploit-for-cve-2018-8174 |
| shayanzare/obj2shellcode | https://github.com/shayanzare/obj2shellcode |
| stephenbradshaw/shellcode | https://github.com/stephenbradshaw/shellcode |
| push4d/shellcode-alfanumerico---spawn-bin-sh-elf-x86- | https://github.com/push4d/shellcode-alfanumerico---spawn-bin-sh-elf-x86- |
| skylined/w32-bind-ngs-shellcode | https://github.com/skylined/w32-bind-ngs-shellcode |
| felixzhang00/shellcode_example | https://github.com/felixzhang00/shellcode_example |
| orangepirate/cve-2018-9948-9958-exp | https://github.com/orangepirate/cve-2018-9948-9958-exp |
| quantumvm/forkshellcode | https://github.com/quantumvm/forkshellcode |
| sh3llc0d3r1337/slae32-polymorphic-shellcodes | https://github.com/sh3llc0d3r1337/slae32-polymorphic-shellcodes |
| wjlandryiii/shellcode | https://github.com/wjlandryiii/shellcode |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#其他-1 |
| secretsquirrel/the-backdoor-factory | https://github.com/secretsquirrel/the-backdoor-factory |
| trustedsec/unicorn | https://github.com/trustedsec/unicorn |
| endgameinc/xori | https://github.com/endgameinc/xori |
| trustedsec/meterssh | https://github.com/trustedsec/meterssh |
| hasherezade/hollows_hunter | https://github.com/hasherezade/hollows_hunter |
| outflanknl/excel4-dcom | https://github.com/outflanknl/excel4-dcom |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-13 |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#新添加-1 |
| 通过Mono(跨平台.NET运行环境)执行shellcode | https://3gstudent.github.io/3gstudent.github.io/%E9%80%9A%E8%BF%87Mono(%E8%B7%A8%E5%B9%B3%E5%8F%B0.NET%E8%BF%90%E8%A1%8C%E7%8E%AF%E5%A2%83)%E6%89%A7%E8%A1%8Cshellcode/ |
| 通过Boolang语言执行shellcode的利用分析 | https://3gstudent.github.io/3gstudent.github.io/%E9%80%9A%E8%BF%87Boolang%E8%AF%AD%E8%A8%80%E6%89%A7%E8%A1%8Cshellcode%E7%9A%84%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90/ |
| Early Security Stories — Green Shellcode Contest | https://medium.com/p/c9aa151b441c |
| shellcode 的艺术 | https://xz.aliyun.com/t/6645 |
| Running Shellcode Directly in C | https://osandamalith.com/2019/08/27/running-shellcode-directly-in-c/ |
| ret2shellcode challenge | https://code610.blogspot.com/2019/08/ret2shellcode-challenge.html |
| Malicious Input: How Hackers Use Shellcode | https://www.sentinelone.com/blog/malicious-input-how-hackers-use-shellcode/ |
| Those Pesky Powershell Shellcode’s And How To Understand Them | https://pcsxcetrasupport3.wordpress.com/2019/07/07/those-pesky-powershell-shellcodes-and-how-to-understand-them/ |
| A Shellcode Idea | https://www.gironsec.com/blog/2019/07/a-shellcode-idea/ |
| Expiring Shellcode update | https://www.gironsec.com/blog/2019/06/expiring-shellcode-update/ |
| Solving MalwareTech Shellcode challenges with some radare2 magic! | https://medium.com/p/b91c85babe4b |
| Shellcode to Dump the Lsass Process | https://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/ |
| Let's Learn: Dissecting Operation ShadowHammer Shellcode Internals in crt_ExitProcess | https://www.vkremez.com/2019/03/lets-learn-dissecting-operation.html |
| A Trinity of Shellcode, AES & Go | https://medium.com/p/f6cec854f992 |
| One-Way Shellcode for firewall evasion using Out Of Band data | https://www.youtube.com/watch?v=wbG7M_Z7GRk |
| One-Way Shellcode for firewall evasion using Out Of Band data | https://www.shelliscoming.com/2019/03/one-way-shellcode-for-firewall-evasion.html |
| A look at a bmp file with embedded shellcode | https://pcsxcetrasupport3.wordpress.com/2019/03/02/a-look-at-a-bmp-file-with-embedded-shellcode/ |
| FreeFloat FTP (custom shellcode) | http://fuzzysecurity.com/exploits/12.html |
| Windows XP PRO SP3 - Full ROP calc shellcode | http://fuzzysecurity.com/exploits/ropshell2.html |
| Micropoor_shellcode for payload backdoor | https://micropoor.blogspot.com/2019/01/micropoorshellcode-for-payload-backdoor.html |
| Maldoc with Nonfunctional Shellcode, (Wed, Jan 2nd) | https://www.ironcastle.net/maldoc-with-nonfunctional-shellcode-wed-jan-2nd/ |
| Maldoc with Nonfunctional Shellcode | https://isc.sans.edu/forums/diary/Maldoc+with+Nonfunctional+Shellcode/24478/ |
| Beginner Reversing #3 (Shellcode2 & Lab Overview) | https://www.youtube.com/watch?v=jm4DmdygLvw |
| Beginner Reversing #2 (Shellcode1 & MEMZ Malware) | https://www.youtube.com/watch?v=b0WQwCQGjv4 |
| Custom Shellcode Crypter – SLAE Exam Assignment #7 | https://www.doyler.net/security-not-included/custom-shellcode-crypter |
| Polymorphic Shellcode – SLAE Exam Assignment #6 | https://www.doyler.net/security-not-included/polymorphic-shellcode |
| Reversing shellcode using blobrunner and Olly | http://malwarenailed.blogspot.com/2018/09/reversing-shellcode-using-blobrunner.html |
| MMFML-powershell-shellcode | http://www.secist.com/archives/7055.html |
| Shellcode Encoding – Random Bytewise XOR (SLAE Exam #4) | https://www.doyler.net/security-not-included/shellcode-encoding-random-bytewise-xor |
| Tản mạn về edit shellcode của metasploit | https://medium.com/p/8b8992ebbf39 |
| Use-after-free (UAF) Vulnerability CVE-2018-8373 in VBScript Engine Affects Internet Explorer to Run Shellcode | https://blog.trendmicro.com/trendlabs-security-intelligence/use-after-free-uaf-vulnerability-cve-2018-8373-in-vbscript-engine-affects-internet-explorer-to-run-shellcode/ |
| Egg Hunter Shellcode – SLAE Exam Assignment #3 | https://www.doyler.net/security-not-included/egg-hunter-shellcode |
| Shell Reverse TCP Shellcode – SLAE Exam Assignment #2 | https://www.doyler.net/security-not-included/shell-reverse-tcp-shellcode |
| Shell Bind TCP Shellcode – SLAE Exam Assignment #1 | https://www.doyler.net/security-not-included/shell-bind-tcp-shellcode |
| [原创]windows下shellcode提取模板的实现 | https://bbs.pediy.com/thread-229398.htm |
| Hello World Shellcode – Now for the fun part! | https://www.doyler.net/security-not-included/hello-world-shellcode |
| Windows reuse shellcode based on socket's lifetime | https://www.shelliscoming.com/2018/06/windows-reuse-shellcode-based-on.html |
| 溢出过程需要的shellcode测试 | https://xz.aliyun.com/t/2349 |
| smap: Shellcode mapper | http://www.pentestingexperts.com/smap-shellcode-mapper-2/ |
| 隐藏Metasploit Shellcode, 躲避Windows Defender检测 | https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/ |
| Linux x86 Polymorphic Shellcode | https://www.sploitspren.com/2018-04-20-Linux-x86-Polymorphic-Shellcode/ |
| Linux x86 Polymorphic Shellcode | https://www.absolomb.com/2018-04-20-Linux-x86-Polymorphic-Shellcode/ |
| Cisco ios shellcode: all-in-one译文 | https://paper.seebug.org/569/ |
| Coding art in shellcode(3) | https://xz.aliyun.com/t/2245 |
| Coding art in shellcode(2) | https://xz.aliyun.com/t/2244 |
| Coding art in shellcode(1) | https://xz.aliyun.com/t/2243 |
| Windows(x86与x64) Shellcode技术研究 | https://www.anquanke.com/post/id/97601/ |
| Improving custom shellcode detection | http://trackwatch.com/improving-custom-shellcode-detection/ |
| Debugging shellcode using BlobRunner and IDA Pro | https://www.youtube.com/watch?v=q9q8dy-2Jeg |
| Egg Hunting:一个非常短的shellcode | https://www.anquanke.com/post/id/87321/ |
| 可以当作推文发送的 x86 Windows 反向 Shell | https://modexp.wordpress.com/2017/11/16/tweetable-shellcode-windows/ |
| [CODEBREAKER] Présentation de la détection des shellcodes encodés sur GATEWATCHER sur Windows Server 2008 R2 (Version 2.X minimum) | http://trackwatch.com/codebreaker-presentation-de-la-detection-des-shellcodes-encodes-sur-gatewatcher-sur-windows-server-2008-r2-version-2-x-minimum/ |
| A patch for PowerSploit’s Invoke-Shellcode.ps1 | https://techblog.mediaservice.net/2017/11/a-patch-for-powersploits-invoke-shellcode-ps1/ |
| 用TEB结构实现ShellCode的通用性 | http://www.freebuf.com/articles/system/150474.html |
| [CODEBREAKER] Présentation de la détection des shellcodes encodés sur GATEWATCHER sur Linux (Version 2.X minimum) | http://trackwatch.com/codebreaker-presentation-de-la-detection-des-shellcodes-encodes-sur-gatewatcher-sur-linux-version-2-x-minimum/ |
| [CODEBREAKER] Présentation de la détection des shellcodes custom non encodés sur GATEWATCHER sur Windows XP (Version 2.5 minimum) | http://trackwatch.com/codebreaker-presentation-de-la-detection-des-shellcodes-custom-non-encodes-sur-gatewatcher-sur-windows-xp-version-2-5-minimum/ |
| Shellcode另类使用方式 | https://xz.aliyun.com/t/56 |
| HITB GSEC CTF Win Pwn解题全记录之babyshellcode | https://www.anquanke.com/post/id/86717/ |
| HITB GSEC CTF Win Pwn 解题全记录之 babyshellcode | https://paper.seebug.org/378/ |
| 通过Shellcode聚类识别定向攻击(APT)相关的恶意代码 | https://www.anquanke.com/post/id/86700/ |
| Let's Learn: Preparing Shellcode in NASM | https://www.vkremez.com/2017/08/preparing-shellcode-in-nasm.html |
| 教你如何使用分组密码对shellcode中的windows api字符串进行加密 | http://www.4hou.com/info/news/7070.html |
| Extract Shellcode from Fileless Malware like a Pro | https://www.youtube.com/watch?v=jbieGfML0Bs |
| Shellcode: The hunt for GetProcAddress | https://modexp.wordpress.com/2017/06/21/shellcode-getprocaddress/ |
| 手把手简易实现shellcode及详解 | http://blog.nsfocus.net/simple-realization-hand-handle-shellcode-detailed-explanation/ |
| [翻译]Shellcode:x86优化 part 1 | https://bbs.pediy.com/thread-218410.htm |
| Shellcode: x86 优化方案(part 1)。Part 1 包括4部分:变量/寄存器的声明和初始化、测试变量/寄存器的值、条件跳转和控制流、字符转换 | https://modexp.wordpress.com/2017/06/07/x86-trix-one/ |
| ShellCode入门(提取ShellCode) | http://www.secist.com/archives/3538.html |
| 任意程序添加ShellCode | http://www.secist.com/archives/3472.html |
| Linux/x86 - Disable ASLR Shellcode (71 bytes) | http://www.abatchy.com/2017/05/linuxx86-disable-aslr-shellcode-71-bytes |
| Shellcode reduction tips (x86) | http://www.abatchy.com/2017/04/shellcode-reduction-tips-x86 |
| [原创][shellcode框架(一)] 认识shellcode,部署shellcode开放框架 | https://bbs.pediy.com/thread-216608.htm |
| 探索基于Windows 10的Windows内核Shellcode(Part 4) | https://www.anquanke.com/post/id/85770/ |
| Windows Kernel Shellcode on Windows 10 – Part 4 - There is No Code | https://improsec.com/blog/windows-kernel-shellcode-on-windows-10-part-4-there-is-no-code |
| 探索基于Windows 10的Windows内核Shellcode(Part 3) | https://www.anquanke.com/post/id/85735/ |
| 智能逃避IDS——RSA非对称多态SHELLCODE | https://www.anquanke.com/post/id/85711/ |
| Windows Shellcode学习笔记——Shellcode的提取与测试 | http://www.4hou.com/technology/3623.html |
| Windows Kernel Shellcode on Windows 10 – Part 3 | https://improsec.com/blog/windows-kernel-shellcode-on-windows-10-part-3 |
| 探索基于Windows 10的Windows内核Shellcode(Part 2) | https://www.anquanke.com/post/id/85669/ |
| 探索基于Windows 10的Windows内核Shellcode(Part 1) | https://www.anquanke.com/post/id/85666/ |
| 反侦测的艺术part3:shellcode炼金术 | https://www.anquanke.com/post/id/85648/ |
| Windows Shellcode学习笔记——栈溢出中对jmp esp的利用与优化 | http://www.4hou.com/technology/3655.html |
| Windows Kernel Shellcode on Windows 10 – Part 2 | https://improsec.com/blog/windows-kernel-shellcode-on-windows-10-part-2 |
| Windows Shellcode学习笔记——shellcode在栈溢出中的利用与优化 | http://www.4hou.com/technology/3654.html |
| Windows Shellcode学习笔记——栈溢出中对jmp esp的利用与优化 | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B8%AD%E5%AF%B9jmp-esp%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E4%BC%98%E5%8C%96/ |
| Shellcode to Scroll your Desktop Vertically and Horizontally | https://osandamalith.com/2017/03/02/shellcode-to-scroll-your-desktop-vertically-and-horizontally/ |
| [原创]PE2Shellcode | https://bbs.pediy.com/thread-216034.htm |
| Windows Shellcode学习笔记——栈溢出中对jmp esp的利用与优化 | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B8%AD%E5%AF%B9jmp-esp%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E4%BC%98%E5%8C%96/ |
| Shellcode to Scroll Your Desktop Horizontally | https://osandamalith.com/2017/02/28/shellcode-to-scroll-your-desktop-horizontally/ |
| Shellcode to Invert Colors | https://osandamalith.com/2017/02/28/shellcode-to-invert-colors/ |
| Windows Kernel Shellcode on Windows 10 – Part 1 | https://improsec.com/blog/windows-kernel-shellcode-on-windows-10-part-1 |
| Shellcode Builder: Shell Factory | https://n0where.net/shellcode-builder-shell-factory |
| Windows Shellcode学习笔记——shellcode在栈溢出中的利用与优化 | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-shellcode%E5%9C%A8%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B8%AD%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E4%BC%98%E5%8C%96/ |
| Windows Shellcode学习笔记——shellcode在栈溢出中的利用与优化 | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-shellcode%E5%9C%A8%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B8%AD%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E4%BC%98%E5%8C%96/ |
| X86 Shellcode代码混淆(一) | http://www.csyssec.org/20170223/obfuscation1/ |
| Shellcode: Dual Mode (x86 + amd64) Linux shellcode | https://modexp.wordpress.com/2017/02/20/shellcode-linux-x84/ |
| Windows Shellcode学习笔记——shellcode的提取与测试 | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-shellcode%E7%9A%84%E6%8F%90%E5%8F%96%E4%B8%8E%E6%B5%8B%E8%AF%95/ |
| Windows Shellcode学习笔记——shellcode的提取与测试 | https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-shellcode%E7%9A%84%E6%8F%90%E5%8F%96%E4%B8%8E%E6%B5%8B%E8%AF%95/ |
| Shellcode: Dual mode PIC for x86 (Reverse and Bind Shells for Windows) | https://modexp.wordpress.com/2017/01/24/shellcode-x84/ |
| Shellcode: Solaris x86 | https://modexp.wordpress.com/2017/01/23/shellcode-solaris/ |
| Shellcode: Mac OSX amd64 | https://modexp.wordpress.com/2017/01/21/shellcode-osx/ |
| Shellcode: Resolving API addresses in memory | https://modexp.wordpress.com/2017/01/15/shellcode-resolving-api-addresses/ |
| 远程漏洞利用:无需借助套接字的Shellcode | https://www.anquanke.com/post/id/85306/ |
| NC后门技术(shellcode版) | https://www.anquanke.com/post/id/85216/ |
| Shellcode: A Windows PIC using RSA-2048 key exchange, AES-256, SHA-3 | https://modexp.wordpress.com/2016/12/26/windows-pic/ |
| 使用PLC作为payload/shellcode分发系统(含演示视频) | https://www.anquanke.com/post/id/85159/ |
| Shellcode. I’ll Call you back. | http://www.hexacorn.com/blog/2016/12/17/shellcode-ill-call-you-back/ |
| Modbus Stager: Using PLCs as a payload/shellcode distribution system | http://www.shelliscoming.com/2016/12/modbus-stager-using-plcs-as.html |
| Shellcode Compiler - 一款易用的 Shellcode 编译工具 | https://paper.seebug.org/134/ |
| VBA Shellcode To Test EMET | https://www.youtube.com/watch?v=ACmcFanE658 |
| VBA Shellcode and EMET | https://isc.sans.edu/forums/diary/VBA+Shellcode+and+EMET/21705/ |
| Synesthesia: Modern Shellcode Synthesis (Ekoparty 2016 Talk) | http://www.msreverseengineering.com/blog/2016/11/8/synesthesia-modern-shellcode-synthesis-ekoparty-2016-talk |
| 浅谈ASLR和Shellcode的那些事儿 | https://www.anquanke.com/post/id/84747/ |
| Maldoc VBA: Shellcode | https://www.youtube.com/watch?v=EJMkK05-Q1o |
| Study Notes Weekly No.2(Shellcode Via JScript & VBScript) | https://3gstudent.github.io/3gstudent.github.io/Study-Notes-Weekly-No.2(Shellcode-Via-JScript-&-VBScript)/ |
| Study Notes Weekly No.2(Shellcode Via JScript & VBScript) | https://3gstudent.github.io/3gstudent.github.io/Study-Notes-Weekly-No.2(Shellcode-Via-JScript-&-VBScript)/ |
| VB Dropper and Shellcode for Hancitor Reveal New Techniques Behi | https://unit42.paloaltonetworks.com/unit42-vb-dropper-and-shellcode-for-hancitor-reveal-new-techniques-behind-uptick/ |
| openCTF 2016 - tyro_shellcode2 | http://uaf.io/exploitation/2016/08/05/openCTF-tyro_shellcode2.html |
| openCTF 2016 - tyro_shellcode | http://uaf.io/exploitation/2016/08/05/openCTF-tyro_shellcode.html |
| Making your Shellcode Undetectable using .NET | https://osandamalith.com/2016/08/01/making-your-shellcode-undetectable-using-net/ |
| Kernel Hacking With HEVD Part 3 - The Shellcode | https://sizzop.github.io/2016/07/07/kernel-hacking-with-hevd-part-3.html |
| X86 Shellcode Obfuscation - Part 3 | https://breakdev.org/x86-shellcode-obfuscation-part-3/ |
| Gracker level7 (Ghost in the Shellcode!) | https://paraschetal.in/gracker-level07 |
| Threat Actors Employ COM Technology in Shellcode to Evade Detection | https://www.mcafee.com/blogs/other-blogs/mcafee-labs/threat-actors-employ-com-technology-shellcode-evade-detection/ |
| Threat Actors Employ COM Technology in Shellcode to Evade Detection | https://securingtomorrow.mcafee.com/mcafee-labs/threat-actors-employ-com-technology-shellcode-evade-detection/ |
| Shellcode: Detection between Windows/Linux/BSD on x86 architecture | https://modexp.wordpress.com/2016/06/02/shellcode-detection/ |
| Malicious Excel documents with macros running shellcodes | http://blog.angelalonso.es/2016/05/malicious-excel-documents-vba-running.html |
| Hack Remote Windows 10 PC using Cypher (Adding Shellcode to PE files) | http://www.hackingarticles.in/hack-remote-windows-10-pc-using-cypher-adding-shellcode-pe-files/ |
| X86 Shellcode Obfuscation - Part 2 | https://breakdev.org/x86-shellcode-obfuscation-part-2/ |
| X86 Shellcode Obfuscation - Part 1 | https://breakdev.org/x86-shellcode-obfuscation-part-1/ |
| OWASP ZCR Shellcoder | https://paraschetal.in/owasp-zsc |
| Shellcode: FreeBSD / OpenBSD amd64 | https://modexp.wordpress.com/2016/04/03/x64-shellcodes-bsd/ |
| Shellcode: Linux amd64 | https://modexp.wordpress.com/2016/03/31/x64-shellcodes-linux/ |
| George Nosenko — Cisco IOS shellcode — all-in-one | https://www.youtube.com/watch?v=T1_TvqtO6y0 |
| OWASP ZSC Shellcoder:定制个人专属Shellcode | http://www.freebuf.com/sectool/95250.html |
| [原创]我也发一个自己写的reverse_bind shellcode代码 | https://bbs.pediy.com/thread-206152.htm |
| Android Shellcode Telnetd with Parameters | https://blog.csdn.net/autohacker/article/details/49838391 |
| Windows bind shell universal shellcode | http://ly0n.me/2015/09/26/windows-bind-shell-universal-shellcode/ |
| Windows bind shell universal shellcode | https://paumunoz.tech/2015/09/26/windows-bind-shell-universal-shellcode/ |
| Creating OSX shellcodes | http://theevilbit.blogspot.com/2015/09/creating-osx-shellcodes.html |
| Bind Shell – shellcode and source | https://www.bigendiansmalls.com/bind-shell-shellcode-and-source/ |
| Windows reverse shell universal shellcode | http://ly0n.me/2015/08/29/windows-reverse-shell-universal-shellcode/ |
| Windows reverse shell universal shellcode | https://paumunoz.tech/2015/08/29/windows-reverse-shell-universal-shellcode/ |
| WinExec calc.exe universal shellcode | http://ly0n.me/2015/08/21/winexec-calc-exe-universal-shellcode/ |
| WinExec calc.exe universal shellcode | https://paumunoz.tech/2015/08/21/winexec-calc-exe-universal-shellcode/ |
| OWASP ZeroDay Cyber Research Shellcoder | https://n0where.net/owasp-zeroday-cyber-research-shellcoder |
| Shellcode Freebie! | https://www.bigendiansmalls.com/shellcode-freebie/ |
| Mainframe shellcode | https://www.bigendiansmalls.com/mainframe-shellcode/ |
| Detecting Shellcode Hidden in Malicious Files | https://digital-forensics.sans.org/blog/2015/06/28/detecting-shellcode |
| Shellcode Techniques in C++ | https://www.tophertimzen.com/blog/shellcodeTechniquesCPP/ |
| Shifting from 32bit to 64bit Linux Shellcode | https://govolution.wordpress.com/2015/04/21/shifting-from-32bit-to-64bit-linux-shellcode/ |
| Dumping shellcode 64bit style | https://govolution.wordpress.com/2015/04/18/dumping-shellcode-64bit-style/ |
| Shellcode in .NET - How the PEB Changes | https://www.tophertimzen.com/blog/shellcodeDotNetPEB/ |
| Running Shellcode in your Raspberry Pi | https://osandamalith.com/2015/03/05/running-shellcode-in-your-rasbperry-pi/ |
| Examining Shellcode in a Debugger through Control of the Instruction Pointer | https://digital-forensics.sans.org/blog/2014/12/30/taking-control-of-the-instruction-pointer |
| x64 Egg-Hunter Shellcode Stager | https://zerosum0x0.blogspot.com/2014/12/x64-egg-hunter-shellcode.html |
| x64 Linux Polymorphic execve() shellcode | https://zerosum0x0.blogspot.com/2014/12/there-are-many-versions-of-execve.html |
| x64 Shellcode One-Time Pad Crypter | https://zerosum0x0.blogspot.com/2014/12/x64-one-time-pad-shellcode-crypter.html |
| x64 Linux Polymorphic forkbomb shellcode | https://zerosum0x0.blogspot.com/2014/12/on-shell-storm-there-is-simple-7-byte.html |
| x64 Linux Polymorphic read file shellcode | https://zerosum0x0.blogspot.com/2014/12/x64-linux-polymorphic-read-file.html |
| x64 Linux reverse TCP connect shellcode (75 to 83 bytes, 88 to 96 with password) | https://zerosum0x0.blogspot.com/2014/12/x64-linux-reverse-tcp-connect-shellcode.html |
| x64 Linux bind TCP port shellcode (80 bytes, 95 with password) | https://zerosum0x0.blogspot.com/2014/12/x64-linux-bind-shellcode-81-bytes-96.html |
| Ghost in the Shellcode Teaser 2015: Lost To Time | http://nebelwelt.net/blog/20141213-GitS-LostToTime.html |
| Windows x64 shellcode编写指南 | https://www.tophertimzen.com/blog/windowsx64Shellcode/ |
| [原创]史上最小无需重定位的"格盘"ShellCode | https://bbs.pediy.com/thread-194664.htm |
| Guest Diary: Didier Stevens - Shellcode Detection with XORSearch | https://isc.sans.edu/forums/diary/Guest+Diary+Didier+Stevens+Shellcode+Detection+with+XORSearch/18929/ |
| Svetlana Gaivoronski - Shellcode detection techniques | https://www.youtube.com/watch?v=bbzH-y93hq0 |
| [原创]根据一个通用的shellcode 还原的一段汇编代码 | https://bbs.pediy.com/thread-192293.htm |
| Shellcode Binder for Windows 64 Bit | https://govolution.wordpress.com/2014/07/26/shellcode-binder-for-windows-64-bit/ |
| shutdown -h now Shellcode | https://osandamalith.com/2014/07/03/shutdown-h-now-shellcode/ |
| Chmod 0777 Polymorphic Shellcode | https://osandamalith.com/2014/06/24/chmod-0777-polymorphic-shellcode/ |
| Pasting Shellcode in GDB using Python | https://parsiya.net/blog/2014-05-25-pasting-shellcode-in-gdb-using-python/ |
| Ghost in the Shellcode: fuzzy (Pwnage 301) | https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-fuzzy-pwnage-301 |
| Two shellcodes and a bit of code | http://0x90909090.blogspot.com/2014/03/two-shellcodes-and-bit-of-code.html |
| Obfuscated shellcode inside a malicious RTF document | https://zairon.wordpress.com/2014/03/06/obfuscated-shellcode-inside-a-malicious-rtf-document/ |
| 用C语言进一步优化Windows Shellcode | http://www.freebuf.com/articles/system/27122.html |
| Shellcode Golf: Every Byte is Sacred | https://blog.rapid7.com/2014/02/14/shellcode-golf/ |
| Shellcode for deleting a file | https://govolution.wordpress.com/2014/02/11/shellcode-for-deleting-a-file/ |
| SLAE: Shellcode read and send file | https://govolution.wordpress.com/2014/01/28/slae-shellcode-read-and-send-file/ |
| Ghost in the Shellcode: gitsmsg (Pwnage 299) | https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-gitsmsg-pwnage-299 |
| SLAE Assignment 6: Polymorphic Shellcode | https://govolution.wordpress.com/2014/01/26/slae-assignment-6-polymorphic-shellcode/ |
| Ghost in the Shellcode: TI-1337 (Pwnable 100) | https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100 |
| [原创]揭示《shellcoder's handbook》中一个函数的运行机制 | https://bbs.pediy.com/thread-183257.htm |
| [原创]shellcode 版的 hello world | https://bbs.pediy.com/thread-182964.htm |
| A Shellter for your shellcode… | http://www.anti-reversing.com/1257/ |
| [原创]旧书重温:0day2[5]shellcode变形记 | https://bbs.pediy.com/thread-182551.htm |
| [Shellcode] MIPS Little Endian Reverse Shell Shellcode (Linux) | http://infosec42.blogspot.com/2013/11/shellcode-mips-little-endian-reverse.html |
| Stdin reopen & execve /bin/sh shellcode for Linux/x86_64 | https://www.voidsecurity.in/2013/08/stdin-reopen-execve-binsh-shellcode-for.html |
| [Shellcode] MIPS Little Endian system() Shellcode | http://infosec42.blogspot.com/2013/07/shellcode-mips-little-endian-system.html |
| [原创]分享用C语言写ShellCode的技术应用--拦截系统记事本工具的保存菜单 | https://bbs.pediy.com/thread-173634.htm |
| [原创]分享用C语言写ShellCode的实现源码 | https://bbs.pediy.com/thread-173358.htm |
| One-liner to only get the shellcode from objdump | https://jumpespjump.blogspot.com/2013/06/only-getting-shellcode-from-objdump.html |
| [原创]新人ShellCode小总结,附带一个讨论问题 | https://bbs.pediy.com/thread-170748.htm |
| Binary to shellcode | https://blog.techorganic.com/2013/03/02/binary-to-shellcode/ |
| Ghost In The Shellcode 2013 CTF - Pwnable 100 - Question 8 Shiftd [Team xbios] | https://www.voidsecurity.in/2013/02/ghost-in-shellcode-2013-ctf-pwnable-100.html |
| [原创]MAsM ShellCode 宏框架使用手册 CHM | https://bbs.pediy.com/thread-160884.htm |
| Fun with AIX Shellcode and Metasploit | https://www.offensive-security.com/vulndev/aix-shellcode-metasploit/ |
| Design and Implementation of Token Stealing Kernel Shellcode for Windows 8 | http://cawanblog.blogspot.com/2012/11/design-and-implementation-of-token.html |
| How To Build A Kernel Shellcode Design and Testing Platform For Windows 8 By Using Windbg | http://cawanblog.blogspot.com/2012/11/how-to-build-kernel-shellcode-design_5.html |
| [原创]ShellCodeToAscii | https://bbs.pediy.com/thread-156913.htm |
| [原创] Shellcode In X64-3 Test Your Shellcode | https://bbs.pediy.com/thread-155371.htm |
| [原创]Shellcode In X64-2Search Function using hash | https://bbs.pediy.com/thread-155341.htm |
| [原创]Shellcode In X64-1Find Kernel32.dll | https://bbs.pediy.com/thread-155336.htm |
| Network detection of x86 buffer overflow shellcode | https://community.rsa.com/community/products/netwitness/blog/2012/08/22/network-detection-of-x86-buffer-overflow-shellcode |
| ShellCode的调试方法和常见问题的解决方法 | https://blog.csdn.net/magictong/article/details/7768026 |
| [原创] 也学构造字母shellcode | https://bbs.pediy.com/thread-151251.htm |
| Embedding a shellcode in a PE file | http://joxeankoret.com/blog/2012/05/06/embedding-a-shellcode-in-a-pe-file/ |
| 文件类漏洞ShellCode的查找 | http://www.91ri.org/2937.html |
| Phishing with obfuscated javascript, shellcode and malware | https://isc.sans.edu/forums/diary/Phishing+with+obfuscated+javascript+shellcode+and+malware/12700/ |
| Linux/x86 Polymorphic ShellCode – setuid(0)+setgid(0)+add user ‘iph’ without password to /etc/passwd | http://www.91ri.org/2714.html |
| [原创]我的第一次vc转shellcode历程 | https://bbs.pediy.com/thread-142657.htm |
| White Hat Shellcode Workshop: Enforcing Permanent DEP | https://www.youtube.com/watch?v=UUQz5JsWirI |
| [原创]OllyDgb下的shellcode提取插件 | https://bbs.pediy.com/thread-138963.htm |
| [求助]在shellcode中遇到疑惑的浮点指令 | https://bbs.pediy.com/thread-135162.htm |
| [原创]Dadong's JSXX 0.39 VIP所用shellcode调试 | https://bbs.pediy.com/thread-132109.htm |
| The Shellcode Lab - Black Hat Training Course | https://www.purehacking.com/blog/ty-miller/the-shellcode-lab-black-hat-training-course |
| Generic CC1110 Sniffing, Shellcode, and iClickers | http://travisgoodspeed.blogspot.com/2011/01/generic-cc1110-sniffing-shellcode-and.html |
| [原创]shellcode框架,纯属娱乐 | https://bbs.pediy.com/thread-125853.htm |
| Hiding Shellcode in Plain Sight | http://e-omidfar.blogspot.com/2010/11/hiding-shellcode-in-plain-sight.html |
| [原创]众里寻他千百度----文件类漏洞ShellCode的查找 | https://bbs.pediy.com/thread-121045.htm |
| [原创]纯字母shellcode揭秘 | https://bbs.pediy.com/thread-113177.htm |
| [原创]基于shellcode感染方式的组合病毒研究 | https://bbs.pediy.com/thread-110429.htm |
| Weaponizing dnscat with shellcode and Metasploit | https://blog.skullsecurity.org/2010/weaponizing-dnscat-with-shellcode-and-metasploit |
| Morphing shellcode using CFGs and SAT | https://sean.heelan.io/2009/06/02/model-checking-smt-solving-and-morphing-shellcode/ |
| Not all shellcode locations are made equal | https://sean.heelan.io/2009/05/13/not-all-shellcode-locations-are-made-equal/ |
| [分享]贴一个MessageBox的shellcode | https://bbs.pediy.com/thread-83968.htm |
| [原创]改写前辈的shellcode(delphi版) | https://bbs.pediy.com/thread-80819.htm |
| Shellcode2Exe | http://edge-security.blogspot.com/2008/12/shellcode2exe.html |
| [原创]汇编打造最简单的shellcode | https://bbs.pediy.com/thread-76204.htm |
| [原创]ShellCode Locator for IDA 5.2 | https://bbs.pediy.com/thread-72947.htm |
| [翻譯]SHELLCODE 設計解密 | https://bbs.pediy.com/thread-69385.htm |
| [原创]32字节的退出进程Shellcode | https://bbs.pediy.com/thread-68560.htm |
| [原创]word 漏洞利用shellcode代码反汇编 | https://bbs.pediy.com/thread-68102.htm |
| [作品提交]ShellCode辅助工具 | https://bbs.pediy.com/thread-66656.htm |
| [原创]快速高效的写shellcode | https://bbs.pediy.com/thread-65309.htm |
| [原创]shellcode之小小琢磨 | https://bbs.pediy.com/thread-60338.htm |
| [原创]完全不懂shellcode解第二阶段第一题 | https://bbs.pediy.com/thread-50721.htm |
| 《The Shellcoder's handbook》第十九章_二进制审计:Hacking不公开源码的软件 | https://bbs.pediy.com/thread-40537.htm |
| 《The Shellcoder's handbook》第十八章_跟踪漏洞 | https://bbs.pediy.com/thread-40164.htm |
| [注意]《The Shellcoder's Handbook》中的笔误 | https://bbs.pediy.com/thread-39968.htm |
| 《The Shellcoder's handbook》第十七章_Instrumented Investigation:手工的方法 | https://bbs.pediy.com/thread-39775.htm |
| 《The Shellcoder's handbook》第十六章_源码审计:在C-Based 语言里寻找漏洞 | https://bbs.pediy.com/thread-39586.htm |
| 《The Shellcoder's handbook》第十五_Fuzzing的技巧 | https://bbs.pediy.com/thread-39220.htm |
| 《The Shellcoder's handbook》第十三章_建立工作环境 | https://bbs.pediy.com/thread-38324.htm |
| 《The Shellcoder's handbook》第十二章_破解HP Tru64 Unix | https://bbs.pediy.com/thread-37937.htm |
| 《The Shellcoder's handbook》第十一章_高级 Solaris 破解 | https://bbs.pediy.com/thread-37575.htm |
| 《The Shellcoder's handbook》第十章_Solaris 破解入门 | https://bbs.pediy.com/thread-37269.htm |
| 《The Shellcoder's handbook》第九章_战胜过滤器 | https://bbs.pediy.com/thread-36885.htm |
| 《The Shellcoder's handbook》第八章_Windows 溢出 | https://bbs.pediy.com/thread-36535.htm |
| 来看看WINRAR溢出漏洞吧,写个SHELLCODE就可以捆绑程序[注意] | https://bbs.pediy.com/thread-36248.htm |
| 《The Shellcoder's handbook》第七章_Windows Shellcode | https://bbs.pediy.com/thread-36216.htm |
| 《The Shellcoder's handbook》翻译汇总及勘误 | https://bbs.pediy.com/thread-35849.htm |
| 《The Shellcoder's handbook》第六章_Windows的广阔原野 | https://bbs.pediy.com/thread-35847.htm |
| Sysenter shellcode | http://em386.blogspot.com/2006/11/sysenter-shellcode.html |
| 《The Shellcoder's handbook》第五章_堆溢出 | https://bbs.pediy.com/thread-35165.htm |
| 《The Shellcoder's handbook》第四章_格式化串漏洞 | https://bbs.pediy.com/thread-34820.htm |
| 《The Shellcoder's handbook》第三章_Shellcode | https://bbs.pediy.com/thread-34433.htm |
| 《The Shellcoder's handbook》第二章_栈溢出 | https://bbs.pediy.com/thread-33986.htm |
| 《The Shellcoder's handbook》第一章_在开始之前 | https://bbs.pediy.com/thread-33670.htm |
| [原创]小议shellcoder | https://bbs.pediy.com/thread-33205.htm |
| [原创]常用ShellCode Hash算法-Delphi内镶BASM | https://bbs.pediy.com/thread-23563.htm |
| shellcode和我写的一个例子 | https://bbs.pediy.com/thread-19294.htm |
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#贡献 |
|
shellcode
| https://patch-diff.githubusercontent.com/topics/shellcode |
|
shellcode-loader
| https://patch-diff.githubusercontent.com/topics/shellcode-loader |
|
shellcode-development
| https://patch-diff.githubusercontent.com/topics/shellcode-development |
|
shellcode-injection
| https://patch-diff.githubusercontent.com/topics/shellcode-injection |
|
shellcode-analysis
| https://patch-diff.githubusercontent.com/topics/shellcode-analysis |
|
shellcode-execute
| https://patch-diff.githubusercontent.com/topics/shellcode-execute |
|
shellcode-encode
| https://patch-diff.githubusercontent.com/topics/shellcode-encode |
|
shellcode-decode
| https://patch-diff.githubusercontent.com/topics/shellcode-decode |
|
shellcode-convert
| https://patch-diff.githubusercontent.com/topics/shellcode-convert |
|
Readme
| https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#readme-ov-file |
| Please reload this page | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources |
|
Activity | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/activity |
|
216
stars | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/stargazers |
|
7
watching | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/watchers |
|
60
forks | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/forks |
|
Report repository
| https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2FalphaSeclab%2Fshellcode-resources&report=alphaSeclab+%28user%29 |
| Releases | https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/releases |
| Packages
0 | https://patch-diff.githubusercontent.com/users/alphaSeclab/packages?repo_name=shellcode-resources |
|
| https://github.com |
| Terms | https://docs.github.com/site-policy/github-terms/github-terms-of-service |
| Privacy | https://docs.github.com/site-policy/privacy-policies/github-privacy-statement |
| Security | https://github.com/security |
| Status | https://www.githubstatus.com/ |
| Community | https://github.community/ |
| Docs | https://docs.github.com/ |
| Contact | https://support.github.com?tags=dotcom-footer |