René's URL Explorer Experiment


Title: GitHub - alphaSeclab/shellcode-resources: Resources About Shellcode

Open Graph Title: GitHub - alphaSeclab/shellcode-resources: Resources About Shellcode

X Title: GitHub - alphaSeclab/shellcode-resources: Resources About Shellcode

Description: Resources About Shellcode. Contribute to alphaSeclab/shellcode-resources development by creating an account on GitHub.

Open Graph Description: Resources About Shellcode. Contribute to alphaSeclab/shellcode-resources development by creating an account on GitHub.

X Description: Resources About Shellcode. Contribute to alphaSeclab/shellcode-resources development by creating an account on GitHub.

Opengraph URL: https://github.com/alphaSeclab/shellcode-resources

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:973e2b49-a9d2-443e-c37e-e7896a8d8fc6
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idA510:96763:DE2C7C:1294CF2:696EE98F
html-safe-nonceaa0f596413c9eacd4b38d8b961331182158281e660784b2d84304288ad01d87a
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJBNTEwOjk2NzYzOkRFMkM3QzoxMjk0Q0YyOjY5NkVFOThGIiwidmlzaXRvcl9pZCI6IjgwMzcxNTYzNDI2NzUyMDQ0OTUiLCJyZWdpb25fZWRnZSI6ImlhZCIsInJlZ2lvbl9yZW5kZXIiOiJpYWQifQ==
visitor-hmacf8e9c75918033cf593c5e271675ec9512d40a48a74088e8b379c2a5ae3bc2576
hovercard-subject-tagrepository:247890959
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/alphaSeclab/shellcode-resources
twitter:imagehttps://opengraph.githubassets.com/c07533c3dece78bf9a3fdd94e6626034c923ebbf38e378468d65fba4138968d6/alphaSeclab/shellcode-resources
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/c07533c3dece78bf9a3fdd94e6626034c923ebbf38e378468d65fba4138968d6/alphaSeclab/shellcode-resources
og:image:altResources About Shellcode. Contribute to alphaSeclab/shellcode-resources development by creating an account on GitHub.
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
Noneb278ad162d35332b6de714dfb005de04386c4d92df6475522bef910f491a35ee
turbo-cache-controlno-preview
go-importgithub.com/alphaSeclab/shellcode-resources git https://github.com/alphaSeclab/shellcode-resources.git
octolytics-dimension-user_id41778948
octolytics-dimension-user_loginalphaSeclab
octolytics-dimension-repository_id247890959
octolytics-dimension-repository_nwoalphaSeclab/shellcode-resources
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forkfalse
octolytics-dimension-repository_network_root_id247890959
octolytics-dimension-repository_network_root_nwoalphaSeclab/shellcode-resources
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release39aed5006635ab6f45e6b77d23e73b08a00272a3
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FalphaSeclab%2Fshellcode-resources
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FalphaSeclab%2Fshellcode-resources
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=alphaSeclab%2Fshellcode-resources
Reloadhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
Reloadhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
Reloadhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
alphaSeclab https://patch-diff.githubusercontent.com/alphaSeclab
shellcode-resourceshttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources
Fork 60 https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources
Star 216 https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources
216 stars https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/stargazers
60 forks https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/forks
Branches https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/branches
Tags https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tags
Activity https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2FalphaSeclab%2Fshellcode-resources
Code https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
Issues 0 https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/issues
Pull requests 0 https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/pulls
Actions https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/actions
Projects 0 https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/projects
Security Uh oh! There was an error while loading. Please reload this page. https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/security
Please reload this pagehttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
Insights https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/pulse
Code https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
Issues https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/issues
Pull requests https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/pulls
Actions https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/actions
Projects https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/projects
Security https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/security
Insights https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/pulse
Brancheshttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/branches
Tagshttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tags
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/branches
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tags
1 Commithttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/commits/master/
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/commits/master/
historyhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tree/master/history
historyhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/tree/master/history
Readme.mdhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/blob/master/Readme.md
Readme.mdhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/blob/master/Readme.md
Readme_en.mdhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/blob/master/Readme_en.md
Readme_en.mdhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/blob/master/Readme_en.md
READMEhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
所有收集类项目https://github.com/alphaSeclab/all-my-collection-repos
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#所有收集类项目
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#shellcode
English Versionhttps://github.com/alphaSeclab/shellcode-resources/blob/master/Readme_en.md
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#目录
开发&&编写https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#046354d96bbc65ade966dc83ff7fe8ef
shellenhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#5489b8896792ff75d1e0971597d5829b
(1)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#7a69f4fc97964348552acb7c8472f1ab
(2)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#e5dc2d01e8279adf30d34066b8c61aaf
漏洞开发https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4f71b3d96ccbb4433cd9582bf6b3b49c
(1)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#1578f4dee1f7b9340b7923d72e67ca75
(13)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#76612bdb96657fd5e6c663f76b738619
编码&&解码https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4137b4aa2b9562fbad4010b40c93c0b8
(9)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#3ab819169565fb2ac49e4a7285b217fd
(14)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#1d15b6ffe1202baecee2e63ceb01261c
(9) 工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#2aad113ca8fd8b2ce5278b3c73afb637
(56) 文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#ba82bf5ca275733d09434861aa4becf5
启动&&加载&&注入&&执行https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#b79d65effe22d7dfa216cdfaaede7abd
注入https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#c8f7f9913bbf6ca9ad62b2924a81c5a1
(13)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#270623a2c94dd2e4a342f46262ee8ae1
(34)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#f67fc5d20ddff852419d63d094cb17ba
执行https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4ad7253b703db90d80efccc99da781e5
(1)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#b84580eec0d446e20ed9c774946f9325
(23)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#9cdbcec9e7e4bf040fe9802dc4e1225b
(22) 工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#2c78519e8cf84e3863d4c2374ead132f
(6) 文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4f9e0536cd4c8b6d7e3597c5c9315df5
生成https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#c86cc38af95f4ccbc3d082b3883af702
(16)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#20753578295f405b2fee3ae5659ee214
(24)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#102a321d8be34fab263fe0559145b36c
转换https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#4d515d3e53e9e4ae1f09bd9f4afc5b5a
(11)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#eb5e32922251dc76e85ed094adbcacd9
(3)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#1d87c2031d25482e324e0b3158e46806
分析https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#9a0361c824e96f82eaec8829d14cf080
漏洞https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#115b4bfacc38bd2fc9b7fa303b5c58ab
(5) 工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#b636936039c6751d5e736ca2e52c8e1a
(53) 文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#ae3243cf65f334dd979b7709d6d745d3
BypassXxxhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#2783a12f735d75d4d9dd34aade4e27fd
AVhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#68671811bf65fa44f770f9b7bf35edba
(5)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#501a34037beb98f8db25e453dc8c6178
(9)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#e4f187de8742002a534b4140989904a4
(5) 工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#8c1f3c12de652e3cb2e2d92d28d762d8
(12) 文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#fa01326b5bfe12e5417c0f4d30146245
ARMhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#82f62a71fbfb0aec18860663d4de5ec2
(2)工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#9ebdbbcde063e2fd71a1f9fef001315a
(9)文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#c7014efbebcc4831883c878a9c4b1736
其他https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#bfaa9390189b5c4ab46ca5631adf3453
工具https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#16001cb2fae35b722deaa3b9a8e5f4d5
(1) 收集https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#714ed53324dd30fc14a3ca7c02b9fc1c
(64) 新添加https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#98d70f3829393b5da364689bc902bab0
(6) 其他https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#d342759bd2543421de29133d9b376df8
文章https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#7d2b1d324dbfb20c3c6da343e9443a5c
(262) 新添加https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#596105c2fa0590982160279ebd1b1eac
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#开发编写
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#shellen
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具
merrychap/shellenhttps://github.com/merrychap/shellen
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章
Shellen:交互式shellcode开发环境http://www.freebuf.com/sectool/164387.html
[翻译] Shellen-交互式shellcode开发环境https://bbs.pediy.com/thread-224810.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#漏洞开发
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-1
sectool/python-shellcode-buffer-overflowhttps://github.com/sectool/Python-Shellcode-Buffer-Overflow
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-1
[翻译]Windows漏洞利用开发 - 第4部分:使用跳转定位Shellcodehttps://bbs.pediy.com/thread-225847.htm
Zero Day Zen Garden: Windows Exploit Development - Part 3 [Egghunter to Locate Shellcode]https://www.shogunlab.com/blog/2017/09/02/zdzg-windows-exploit-3.html
Zero Day Zen Garden: Windows Exploit Development - Part 2 [JMP to Locate Shellcode]https://www.shogunlab.com/blog/2017/08/26/zdzg-windows-exploit-2.html
Exploit Dev 101: Jumping to Shellcodehttp://www.abatchy.com/2017/05/jumping-to-shellcode.html
Exploiting Weak Shellcode Hashes to Thwart Module Discovery; or, Go Home, Malware, You’re Drunk!https://www.digitaloperatives.com/2016/06/23/exploiting-weak-shellcode-hashes/
[翻译]Windows Exploit开发系列教程第六部分:WIN32 shellcode编写https://bbs.pediy.com/thread-207096.htm
[翻译]exploit开发教程第六章-shellcodehttps://bbs.pediy.com/thread-206946.htm
Avoiding badchars & small buffers with custom shellcode – OdinSecureFTPclient SEH exploithttp://ly0n.me/2015/08/10/avoiding-badchars-small-buffers-with-custom-shellcode-odinsecureftpclient-seh-exploit/
Avoiding badchars & small buffers with custom shellcode – OdinSecureFTPclient SEH exploithttps://paumunoz.tech/2015/08/10/avoiding-badchars-small-buffers-with-custom-shellcode-odinsecureftpclient-seh-exploit/
Exploiting with BeEF Bind shellcodehttp://blog.beefproject.com/2014/03/exploiting-with-beef-bind-shellcode_19.html
Windows Exploit Development – Part 5: Locating Shellcode With Egghuntinghttps://www.securitysift.com/windows-exploit-development-part-5-locating-shellcode-egghunting/
Windows Exploit Development – Part 4: Locating Shellcode With Jumpshttps://www.securitysift.com/windows-exploit-development-part-4-locating-shellcode-jumps/
[原创]exploit_me_A的shellcode构造与突破https://bbs.pediy.com/thread-57561.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#编码解码
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-2
mothran/unicorn-decoderhttps://github.com/mothran/unicorn-decoder
ecx86/shellcode_encoderhttps://github.com/ecx86/shellcode_encoder
eteissonniere/elidecodehttps://github.com/ETeissonniere/EliDecode
ihack4falafel/slinkhttps://github.com/ihack4falafel/slink
blacknbunny/encdecshellcodehttps://github.com/blacknbunny/encdecshellcode
veritas501/ae64https://github.com/veritas501/ae64
anon6372098/faz-shchttps://github.com/anon6372098/faz-shc
sh3llc0d3r1337/slae32-custom-encoderhttps://github.com/sh3llc0d3r1337/slae32-custom-encoder
pcsxcetra/equationeditorshellcodedecoderhttps://github.com/pcsxcetra/equationeditorshellcodedecoder
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-2
Metasploit Shellcode Grows Up: Encrypted and Authenticated C Shellshttps://blog.rapid7.com/2019/11/21/metasploit-shellcode-grows-up-encrypted-and-authenticated-c-shells/
Shellcode编码技术https://xz.aliyun.com/t/6665
A deeper look at Equation Editor CVE-2017-11882 with encoded Shellcodehttps://pcsxcetrasupport3.wordpress.com/2019/05/22/a-deeper-look-at-equation-editor-cve-2017-11882-with-encoded-shellcode/
The Lost Art of Shellcode Encoder/Decodershttps://cybersecpolitics.blogspot.com/2019/03/the-lost-art-of-shellcode.html
编写 Shellcode XOR 编码/解码器, 躲避AV检测https://www.doyler.net/security-not-included/shellcode-xor-encoder-decoder
SLAE:如何开发自定义的RBIX Shellcode编码解码器https://www.anquanke.com/post/id/86693/
Building shellcode, egghunters and decoders.https://www.bigendiansmalls.com/creating-shellcode-to-run-in-uss/
Huffy:哈夫曼编码的shellcodehttp://www.freebuf.com/articles/system/59781.html
GitS 2015: Huffy (huffman-encoded shellcode)https://blog.skullsecurity.org/2015/gits-2015-huffy-huffman-encoded-shellcode
x64 Shellcode Byte-Rotate Encoderhttps://zerosum0x0.blogspot.com/2014/12/x64-shellcode-byte-rotate-encoder.html
Building a Decoder for the CVE-2014-0502 Shellcodehttps://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html
Experiment With Run Time Encryption/Decryption of Win32 ShellCodeshttp://www.debasish.in/2012/08/experiment-with-run-time.html
[原创]shellcode xor编码/解码https://bbs.pediy.com/thread-151108.htm
[原创]shellcode的一种ascii编码方法https://bbs.pediy.com/thread-70964.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-3
reyammer/shellnoobhttps://github.com/reyammer/shellnoob
thesecondsun/shellabhttps://github.com/thesecondsun/shellab
jackullrich/shellcodestdiohttps://github.com/jackullrich/shellcodestdio
lcatro/vuln_javascripthttps://github.com/lcatro/vuln_javascript
invictus1306/workshop-bsidesmunich2018https://github.com/invictus1306/workshop-bsidesmunich2018
shellvm/shellvmhttps://github.com/shellvm/shellvm
novicelive/shellcodinghttps://github.com/novicelive/shellcoding
jlxip/shellcode-idehttps://github.com/jlxip/shellcode-ide
wanttobeno/study_shellcodehttps://github.com/wanttobeno/study_shellcode
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-3
shellcode编写过程总结https://xz.aliyun.com/t/7072
Writing shellcodes for Windows x64https://nytrosecurity.com/2019/06/30/writing-shellcodes-for-windows-x64/
Windows x86 Shellcode开发:寻找Kernel32.dll地址https://www.4hou.com/system/17180.html
Writing a Custom Shellcode Encoderhttps://medium.com/p/31816e767611
用ARM编写shellcodehttps://xz.aliyun.com/t/4098
Writing shellcode to binary fileshttp://fuzzysecurity.com/tutorials/7.html
Part 6: Writing W32 shellcodehttp://fuzzysecurity.com/tutorials/expDev/6.html
过年不屯点干货吗,Windows平台高效Shellcode编程技术实战|精品公开课https://www.freebuf.com/fevents/194308.html
[BOOK] Shellcode writting in Windows environmentshttp://ly0n.me/2019/01/03/shellcode-writting-in-windows-environments/
[BOOK] Shellcode writting in Windows environmentshttps://paumunoz.tech/2019/01/03/shellcode-writting-in-windows-environments/
FreeBSD上编写x86 Shellcode初学者指南http://www.4hou.com/binary/14375.html
[原创]《0day安全...(第二版)》第3章第4节开发通用的shellcode在win10系统下测试的问题https://bbs.pediy.com/thread-246532.htm
路由器漏洞复现终极奥义——基于MIPS的shellcode编写https://www.anquanke.com/post/id/153725/
[翻译]二进制漏洞利用(一)编写ARMshellcode&理解系统函数https://bbs.pediy.com/thread-230148.htm
Windows下Shellcode编写详解https://xz.aliyun.com/t/2108
Sickle:推荐一款优质ShellCode开发工具http://www.freebuf.com/sectool/162332.html
Linux下shellcode的编写https://xz.aliyun.com/t/2052
我的shellcode编写之路 |MSF| Shellcode | kali linux 2017http://www.secist.com/archives/4809.html
Shellcode编程之特征搜索定位GetProcAddresshttps://www.anquanke.com/post/id/86334/
解决 CTF "b-64-b-tuff":手动编写 base64 解码器及 alphanumeric shellcodehttps://blog.skullsecurity.org/2017/solving-b-64-b-tuff-writing-base64-and-alphanumeric-shellcode
Windows x64 shellcode编写指南https://www.anquanke.com/post/id/86175/
如何编写高质量的Windows Shellcodehttp://www.freebuf.com/articles/system/133990.html
[翻译]Windows平台下的Shellcode代码优化编写指引https://bbs.pediy.com/thread-217513.htm
HEVD 内核攻击: 编写Shellcode(三)http://www.4hou.com/technology/3942.html
shellcode编程:在内存中解析API地址https://www.anquanke.com/post/id/85386/
Writing your own shellcode.https://paraschetal.in/writing-your-own-shellcode
Windows平台shellcode开发入门(三)http://www.freebuf.com/articles/system/97215.html
Introduction to Windows shellcode development – Part 3https://securitycafe.ro/2016/02/15/introduction-to-windows-shellcode-development-part-3/
Windows平台shellcode开发入门(二)http://www.freebuf.com/articles/system/94774.html
Windows平台shellcode开发入门(一)http://www.freebuf.com/articles/system/93983.html
When Every Byte Counts – Writing Minimal Length Shellcodeshttp://securitygossip.com/blog/2016/01/07/2016-01-07/
When Every Byte Counts – Writing Minimal Length Shellcodeshttps://loccs.sjtu.edu.cn/gossip/blog/2016/01/07/2016-01-07/
Introduction to Windows shellcode development – Part 2https://securitycafe.ro/2015/12/14/introduction-to-windows-shellcode-development-part-2/
Introduction to Windows shellcode development – Part 1https://securitycafe.ro/2015/10/30/introduction-to-windows-shellcode-development-part1/
Windows平台下高级Shellcode编程技术http://www.freebuf.com/articles/system/58920.html
[原创]windows平台下的高级shellcode编程技术https://bbs.pediy.com/thread-197835.htm
windows平台下高级shellcode编程技术http://blog.topsec.com.cn/ad_lab/windows%e5%b9%b3%e5%8f%b0%e4%b8%8b%e5%8a%9f%e8%83%bd%e6%80%a7shellcode%e7%9a%84%e7%bc%96%e5%86%99/
[原创]Masm宏框架 简单编写复杂的ShellCodehttps://bbs.pediy.com/thread-191650.htm
使用C编写shellcodehttp://www.91ri.org/9057.html
[原创]编写二进制的shellcodehttps://bbs.pediy.com/thread-182356.htm
[原创]PE感染&ShellCode编写技术补充https://bbs.pediy.com/thread-172961.htm
ShellNoob v1.0 – Shellcode Writing Toolkithttp://www.toolswatch.org/2013/05/shellnoob-v1-0-shellcode-writing-toolkit/
ShellNoob 1.0 - a shellcode writing toolkithttp://reyammer.blogspot.com/2013/04/shellnoob-10-shellcode-writing-toolkit.html
[原创]Android系统shellcode编写https://bbs.pediy.com/thread-155774.htm
shellcode的编写与关键http://www.91ri.org/3335.html
[原创]MASM之ShellCode框架编写[合并帖]https://bbs.pediy.com/thread-135062.htm
[原创]Win 7下定位kernel32.dll基址及shellcode编写https://bbs.pediy.com/thread-122260.htm
[翻译]Exploit 编写系列教程第九篇Win32 Shellcode编写入门https://bbs.pediy.com/thread-120649.htm
Writing OS Independent Shellcodehttps://blog.elearnsecurity.com/writing-os-independent-shellcode.html
[原创]Writing JIT-Spray Shellcode for fun and profit - CHS[更新完整版]https://bbs.pediy.com/thread-108861.htm
[原创]编写反连ShellCode遇到的难点并解决之总结https://bbs.pediy.com/thread-105567.htm
[翻译]Exploit编写系列教程第二篇: 栈溢出——跳至shellcodehttps://bbs.pediy.com/thread-101704.htm
Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcodehttps://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
[翻译]写一段小型溢出代码(译自:Writing Small Shellcode)https://bbs.pediy.com/thread-80306.htm
[原创]ShellCode编写之hash式函数调用及相关https://bbs.pediy.com/thread-58393.htm
[原创]VC8编写ShellCode以及辅助工具https://bbs.pediy.com/thread-28681.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#启动加载注入执行
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#注入
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-4
gpoulios/ropinjectorhttps://github.com/gpoulios/ropinjector
josh0xa/threadboathttps://github.com/josh0xA/ThreadBoat
countercept/doublepulsar-usermode-injectorhttps://github.com/countercept/doublepulsar-usermode-injector
sensepost/anapicklehttps://github.com/sensepost/anapickle
psychomario/pyinjecthttps://github.com/psychomario/pyinject
borjamerino/tlsinjectorhttps://github.com/borjamerino/tlsinjector
taroballzchen/shecodjecthttps://github.com/TaroballzChen/shecodject
binject/shellcodehttps://github.com/binject/shellcode
jorik041/cymothoahttps://github.com/jorik041/cymothoa
michaelburge/redshift-shellcodehttps://github.com/michaelburge/redshift-shellcode
chango77747/shellcodeinjector_msbuildhttps://github.com/chango77747/shellcodeinjector_msbuild
egebalci/injectorhttps://github.com/egebalci/injector
xiaobo93/unmodule_shellcode_injecthttps://github.com/xiaobo93/unmodule_shellcode_inject
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-4
手工shellcode注入PE文件https://xz.aliyun.com/t/6939
代码注入技术之Shellcode注入https://www.4hou.com/web/21784.html
Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injectionhttps://www.youtube.com/watch?v=XnN_UWfHlNM
在遇到shellcode注入进程时所使用的调试技https://www.freebuf.com/articles/system/212248.html
远程进程shellcode注入调试技巧https://www.4hou.com/system/19852.html
Arm平台Ptrace注入shellcode技术https://www.anquanke.com/post/id/179985/
[原创]代替创建用户线程使用ShellCode注入DLL的小技巧https://bbs.pediy.com/thread-247515.htm
[分享]绝对牛逼哄哄的shellcode内存注入,支持64,32,远程内存注入,支持VMP壳最大强度保护https://bbs.pediy.com/thread-246934.htm
sRDI:一款通过Shellcode实现反射型DLL注入的强大工具http://www.freebuf.com/sectool/181426.html
PowerShell Shellcode Injection on Win 10 (v1803)https://blog.cobaltstrike.com/2018/05/24/powershell-shellcode-injection-on-win-10-v1803/
Shecodject – Autoscript for Shellcode Injectionhttps://pentesttoolz.com/2017/12/30/shecodject-autoscript-for-shellcode-injection/
Malware Analysis - ROKRAT Unpacking from Injected Shellcodehttps://www.youtube.com/watch?v=uoBQE5s2ba4
Metasploit自动化Bypass Av脚本:Shecodject X Shellcode Injectionhttp://www.freebuf.com/sectool/154356.html
[原创]通过Wannacry分析内核shellcode注入dll技术https://bbs.pediy.com/thread-221756.htm
sRDI – Shellcode Reflective DLL Injectionhttps://silentbreaksecurity.com/srdi-shellcode-reflective-dll-injection/
Shellcode Injectionhttps://dhavalkapil.com/blogs/Shellcode-Injection/
Dynamic Shellcode Injection: Shellterhttps://n0where.net/dynamic-shellcode-injection-shellter
Kali Shellter 5.1:动态ShellCode注入工具 绕过安全软件http://www.freebuf.com/sectool/81955.html
Injecting Shellcode into a Remote Process with Pythonhttps://www.christophertruncer.com/injecting-shellcode-into-a-remote-process-with-python/
[原创]纯C++编写Win32/X64通用Shellcode注入csrss进程.https://bbs.pediy.com/thread-203140.htm
BSidesLisbon2015 - Shellter - A dynamic shellcode injector - Kyriakos Economouhttps://www.youtube.com/watch?v=TunWNHYrWp8
动态Shellcode注入工具 – Shellterhttp://www.freebuf.com/sectool/71230.html
TLS Injector: running shellcodes through TLS callbackshttp://www.shelliscoming.com/2015/06/tls-injector-running-shellcodes-through.html
Shellter v1.7 A Dynamic ShellCode Injector – Releasedhttp://www.toolswatch.org/2014/08/shellter-v1-7-a-dynamic-shellcode-injector-released/
[New Tool] Shellter v1.0 A Dynamic ShellCode Injector – Releasedhttp://www.toolswatch.org/2014/06/new-tool-shellter-v1-0-a-dynamic-shellcode-injector-released/
Injecting Shellcode into a Portable Executable(PE) using Pythonhttp://www.debasish.in/2013/06/injecting-shellcode-into-portable.html
Native PowerShell x86 Shellcode Injection on 64-bit Platformshttps://www.trustedsec.com/2013/05/native-powershell-x86-shellcode-injection-on-64-bit-platforms/
[原创]内核ShellCode注入的一种方法https://bbs.pediy.com/thread-170959.htm
Cymothoa – Runtime shellcode injection Backdoorshttp://www.hackingarticles.in/cymothoa-runtime-shellcode-injection-for-stealthy-backdoors/
PyInjector Shellcode Injection attack on Remote PC using Social Engineering Toolkithttp://www.hackingarticles.in/pyinjector-shellcode-injection-attack-on-remote-windows-pc-using-social-engineering-toolkit/
New tool PyInjector Released – Python Shellcode Injectionhttps://www.trustedsec.com/2012/08/new-tool-pyinjector-released-python-shellcode-injection/
Syringe utility provides ability to inject shellcode into processeshttps://firebitsbr.wordpress.com/2011/07/08/syringe-utility-provides-ability-to-inject-shellcode-into-processes/
《The Shellcoder's handbook》第十四章_故障注入https://bbs.pediy.com/thread-38713.htm
[原创]ShellCode的另外一种玩法(远程线程注入ShellCode)https://bbs.pediy.com/thread-21123.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#执行
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-5
dimopouloselias/simpleshellcodeinjectorhttps://github.com/dimopouloselias/simpleshellcodeinjector
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-5
Windows shellcode执行技术入门指南https://www.4hou.com/web/19758.html
A Beginner’s Guide to Windows Shellcode Execution Techniqueshttps://www.contextis.com/en/blog/a-beginners-guide-to-windows-shellcode-execution-techniques
Dynamic Shellcode Executionhttps://countercept.com/blog/dynamic-shellcode-execution/
Dynamic Shellcode Executionhttps://countercept.com/our-thinking/dynamic-shellcode-execution/
投稿文章:Bypass Applocker + 免杀执行任意 shellcode [ csc + installUtil ]https://www.t00ls.net/articles-49443.html
ShellCode执行代码iptables -P INPUT ACCEPThttp://www.91ri.org/17267.html
使Windows Loader直接执行ShellCode,IDA载入文件时崩溃,而且绕过大多数杀软。https://osandamalith.com/2017/04/11/executing-shellcode-directly/
利用原生Windows函数执行shellcodehttps://www.anquanke.com/post/id/85372/
Office Shellcode Executionhttps://evi1cg.me/archives/Office_Shellcode_Execution.html
宏病毒利用EnumDateFormats执行Shellcode创建傀进程绕杀软https://tav.qq.com/index/newsDetail/260.html
CallWindowProc被宏病毒利用来执行Shellcodehttps://www.anquanke.com/post/id/84433/
Shellcode: Execute command for x32/x64 Linux / Windows / BSDhttps://modexp.wordpress.com/2016/06/04/winux/
Shellcodes: Executing Windows and Linux Shellcodeshttps://modexp.wordpress.com/2016/03/28/winux-shellcodes/
Executing Shellcode with Pythonhttps://www.doyler.net/security-not-included/executing-shellcode-with-python
BSidesCHS 2013 - Session 02 - Java Shellcode Executionhttps://www.youtube.com/watch?v=oVT4khoSYBU
[原创]从内核在WOW64进程中执行用户态shellcodehttps://bbs.pediy.com/thread-190596.htm
Hide meterpreter shellcode in executablehttps://blog.sevagas.com/?Hide-meterpreter-shellcode-in-executable
利用vbs优雅的执行shellcodehttp://www.freebuf.com/articles/web/11662.html
HunnyBunny: Execute any shellcode on thehttps://y0nd13.blogspot.com/2013/02/hunnybunny-execute-any-shellcode-on-the.html
Execute ShellCode Using Pythonhttp://www.debasish.in/2012/04/execute-shellcode-using-python.html
Shellcode分段执行技术原理http://riusksk.me/2010/12/23/shellcode-split/
[原创]从执行流程看shellcode(一)[附源代码]https://bbs.pediy.com/thread-82327.htm
[求助]第五章的通用shellcode在password.txt中始终无法正常执行令我好生头痛https://bbs.pediy.com/thread-79704.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-6
inquisb/shellcodeexechttps://github.com/inquisb/shellcodeexec
clinicallyinane/shellcode_launcherhttps://github.com/clinicallyinane/shellcode_launcher
pyana/pyanahttps://github.com/pyana/pyana
brimstone/go-shellcodehttps://github.com/brimstone/go-shellcode
peterferrie/win-exec-calc-shellcodehttps://github.com/peterferrie/win-exec-calc-shellcode
coldzer0/cmulatorhttps://github.com/coldzer0/cmulator
arno0x/dnsdeliveryhttps://github.com/arno0x/dnsdelivery
zerosum0x0/runshellcodehttps://github.com/zerosum0x0/runshellcode
rvrsh3ll/cplresourcerunnerhttps://github.com/rvrsh3ll/cplresourcerunner
fireeye/flare-kscldrhttps://github.com/fireeye/flare-kscldr
enigma0x3/powershell-payload-excel-deliveryhttps://github.com/enigma0x3/powershell-payload-excel-delivery
emptymonkey/drinkmehttps://github.com/emptymonkey/drinkme
zerosum0x0/shellcodedriverhttps://github.com/zerosum0x0/shellcodedriver
sisoma2/shellcodeloaderhttps://github.com/sisoma2/shellcodeloader
userexistserror/dllloadershellcodehttps://github.com/userexistserror/dllloadershellcode
n1nj4sec/pymemimporterhttps://github.com/n1nj4sec/pymemimporter
eik00d/reverse_dns_shellcodehttps://github.com/eik00d/reverse_dns_shellcode
thomaskeck/pyshellcodehttps://github.com/thomaskeck/pyshellcode
0xyg3n/mem64https://github.com/0xyg3n/mem64
naxalpha/shellcode-loaderhttps://github.com/naxalpha/shellcode-loader
samvartaka/triton_analysishttps://github.com/samvartaka/triton_analysis
brimstone/shellloadhttps://github.com/brimstone/shellload
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-6
一个可以动态分析恶意软件的工具——Kernel Shellcode Loaderhttp://www.4hou.com/technology/11235.html
内核中加载Shellcode: 实例、方法与工具http://www.fireeye.com/blog/threat-research/2018/04/loading-kernel-shellcode.html
[翻译]Windows内核ShellCode的动态加载和调试https://bbs.pediy.com/thread-218779.htm
如何从猫咪图片中加载运行shellcodehttps://www.anquanke.com/post/id/85824/
Shellcode: Fido and how it resolves GetProcAddress and LoadLibraryAhttps://modexp.wordpress.com/2017/02/03/shellcode-iat/
Writing a download and exec shellcodehttps://govolution.wordpress.com/2014/02/02/writing-a-download-and-exec-shellcode/
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#生成
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-7
thewover/donuthttps://github.com/thewover/donut
r00t-3xp10it/venomhttps://github.com/r00t-3xp10it/venom
nytrorst/shellcodecompilerhttps://github.com/nytrorst/shellcodecompiler
zdresearch/owasp-zschttps://github.com/zdresearch/OWASP-ZSC
gdelugre/shell-factoryhttps://github.com/gdelugre/shell-factory
alexpark07/armscgenhttps://github.com/alexpark07/armscgen
hatriot/shellmehttps://github.com/hatriot/shellme
veil-framework/veil-ordnancehttps://github.com/veil-framework/veil-ordnance
karttoon/trigenhttps://github.com/karttoon/trigen
3gstudent/shellcode-generaterhttps://github.com/3gstudent/shellcode-generater
rh0dev/shellcode2asmjshttps://github.com/rh0dev/shellcode2asmjs
zdresearch/zcr-shellcoder-archivehttps://github.com/zdresearch/zcr-shellcoder-archive
hoodoer/enneoshttps://github.com/hoodoer/enneos
clonemerge/shellgenhttps://github.com/CloneMerge/ShellGen
thepisode/linux-shellcode-generatorhttps://github.com/thepisode/linux-shellcode-generator
ins1gn1a/woollymammothhttps://github.com/ins1gn1a/woollymammoth
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-7
生成可打印的shellcodehttps://xz.aliyun.com/t/5662
Shellcode生成工具Donut测试分析https://www.4hou.com/technology/19123.html
Shellcode生成工具Donut测试分析https://3gstudent.github.io/3gstudent.github.io/Shellcode%E7%94%9F%E6%88%90%E5%B7%A5%E5%85%B7Donut%E6%B5%8B%E8%AF%95%E5%88%86%E6%9E%90/
Generating Shellcode With Msfvenomhttps://www.youtube.com/watch?v=nNt_gRl8RBk
[原创] 抛砖引玉之gcc生成可可携带字符串的shellcodehttps://bbs.pediy.com/thread-247138.htm
Execve Shellcode – Includes Arguments and Generator!https://www.doyler.net/security-not-included/execve-shellcode-generator
[原创]简陋的小工具:DWORD数组形式拷贝shellcode内容;裸函数生成https://bbs.pediy.com/thread-225030.htm
VENOM 1.0.15 – Metasploit Shellcode Generator/Compiler/Listenerhttps://pentesttoolz.com/2018/02/11/venom-1-0-15-metasploit-shellcode-generator-compiler-listener/
在线版 混淆字符串/Shellcode 生成器https://zerosum0x0.blogspot.com/2017/08/obfuscatedencrypted-cc-online-string.html
[原创]开源ShellCode生成引擎https://bbs.pediy.com/thread-219956.htm
SynesthesiaYS 介绍http://www.msreverseengineering.com/blog/2017/7/15/the-synesthesia-shellcode-generator-code-release-and-future-directions
ROT-N Shellcode Encoder/Generator (Linux x86)http://www.abatchy.com/2017/05/rot-n-shellcode-encoder-linux-x86
生成自己的Alphanumeric/Printable shellcodehttps://www.anquanke.com/post/id/85871/
Windows Shellcode学习笔记——通过VisualStudio生成shellcodehttp://www.4hou.com/technology/3335.html
Shellcode Generation, Manipulation, and Injection in Python 3https://www.christophertruncer.com/shellcode-manipulation-and-injection-in-python-3/
Windows Shellcode学习笔记——通过VisualStudio生成shellcodehttps://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E9%80%9A%E8%BF%87VisualStudio%E7%94%9F%E6%88%90shellcode/
Windows Shellcode学习笔记——通过VisualStudio生成shellcodehttps://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E9%80%9A%E8%BF%87VisualStudio%E7%94%9F%E6%88%90shellcode/
Exploitation of Windows PC using Venom: Shellcode Generatorhttp://www.hackingarticles.in/exploitation-of-windows-pc-using-venom-shellcode-generator/
工具推荐:Shellsploit,ShellCode生成器http://www.freebuf.com/sectool/95039.html
Shellcode Generator: Venomhttps://n0where.net/shellcode-generator-venom
Null Free Windows WinExec Shellcode & Tool for generating Payloadhttps://govolution.wordpress.com/2015/02/07/one-for-all-null-free-windows-winexec-shellcode-tool-for-generating-payload/
How to generate shellcode from custom exe in metasploithttp://securityblog.gr/2144/how-to-generate-shellcode-from-custom-exe-in-metasploit/
phpcodegen-library[php生成shellcode函数库]http://www.freebuf.com/sectool/1941.html
[原创]生成一个关于URLDownloadToFile的shellcode机器码https://bbs.pediy.com/thread-55326.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#转换
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-8
monoxgas/srdihttps://github.com/monoxgas/srdi
hasherezade/pe_to_shellcodehttps://github.com/hasherezade/pe_to_shellcode
blacknbunny/shellcode2assemblyhttps://github.com/blacknbunny/shellcode2assembly
w1nds/dll2shellcodehttps://github.com/w1nds/dll2shellcode
5loyd/makecodehttps://github.com/5loyd/makecode
after1990s/pe2shellcodehttps://github.com/after1990s/pe2shellcode
davinci13/exe2shellhttps://github.com/davinci13/exe2shell
gnebbia/shellcoderhttps://github.com/gnebbia/shellcoder
giantbranch/convert-c-javascript-shellcodehttps://github.com/giantbranch/convert-c-javascript-shellcode
hamza-megahed/binary2shellcodehttps://github.com/hamza-megahed/binary2shellcode
yatebyalubaluniyat/rawshellcode2exehttps://github.com/yatebyalubaluniyat/rawshellcode2exe
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-8
[原创]【Python】使用Python将Shellcode转换成汇编https://bbs.pediy.com/thread-222965.htm
如何把shellcode转换成exe文件分析http://www.freebuf.com/articles/web/152879.html
Converting Shellcode to Portable Executable (32- and 64- bit)http://www.hexacorn.com/blog/2015/12/10/converting-shellcode-to-portable-executable-32-and-64-bit/
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#分析
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#漏洞
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-9
rootlabs/smaphttps://github.com/suraj-root/smap
oalabs/blobrunnerhttps://github.com/oalabs/blobrunner
dungtv543/dutashttps://github.com/dungtv543/dutas
adamkramer/jmp2ithttps://github.com/adamkramer/jmp2it
debasishm89/qhookhttps://github.com/debasishm89/qhook
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-9
Building A Custom Tool For Shellcode Analysishttps://www.sentinelone.com/blog/building-a-custom-tool-for-shellcode-analysis/
Xori:一款针对PE32和Shellcode的自动化反编译与静态分析库https://www.freebuf.com/sectool/199629.html
"VelvetSweatshop" Maldocs: Shellcode Analysishttps://isc.sans.edu/forums/diary/VelvetSweatshop+Maldocs+Shellcode+Analysis/24776/
对某HWP漏洞样本的shellcode分析https://www.anquanke.com/post/id/169872/
BlueHat v18 || Linear time shellcode detection using state machines and operand analysis on the runtimehttps://www.slideshare.net/MSbluehat/bluehat-v18-linear-time-shellcode-detection-using-state-machines-and-operand-analysis-on-the-runtime
Analyzing Encoded Shellcode with scdbg, (Mon, Sep 24th)https://www.ironcastle.net/analyzing-encoded-shellcode-with-scdbg-mon-sep-24th/
Analyzing Encoded Shellcode with scdbghttps://isc.sans.edu/forums/diary/Analyzing+Encoded+Shellcode+with+scdbg/24134/
Using scdbg to analyze shellcodehttps://www.youtube.com/watch?v=SHgIVMVnP0w
Video: Using scdbg to analyze shellcode, (Sat, Sep 8th)https://www.ironcastle.net/video-using-scdbg-to-analyze-shellcode-sat-sep-8th/
Another quickie: Using scdbg to analyze shellcodehttps://isc.sans.edu/forums/diary/Another+quickie+Using+scdbg+to+analyze+shellcode/24058/
Metasploit Shellcode Analysis – read_file via ndisasm (SLAE Exam #5.1)https://www.doyler.net/security-not-included/metasploit-shellcode-analysis
Analyzing Shellcode of GrandSoft's CVE-2018-8174https://www.nao-sec.org/2018/06/analyzing-shellcode-of-grandsofts-cve.html
[原创]od逆向分析栈溢出shellcodehttps://bbs.pediy.com/thread-226476.htm
Analyzing compressed shellcodehttps://isc.sans.edu/forums/diary/Analyzing+compressed+shellcode/23335/
EternalBlue Shellcode详细分析https://www.anquanke.com/post/id/86392/
NSA武器库:DoublePulsar初始SMB后门shellcode分析https://www.anquanke.com/post/id/86112/
NSA武器库:DoublePulsar初始SMB后门shellcode分析https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html
Episode 3 – Shellcode Analysis with APITrackerhttps://cysinfo.com/episode-3-shellcode-analysis-apitracker/
恶意文档分析:从宏指令到Shellcodehttps://www.anquanke.com/post/id/85147/
Hancitor Maldoc: Shellcode Dynamic Analysishttps://www.youtube.com/watch?v=N9fqJ0DYs0g
Dynamic shellcode analysishttp://www.miasm.re/blog/2016/02/12/dynamic_shellcode_analysis.html
Shellcode分析工具PyAnahttp://www.freebuf.com/sectool/92990.html
Hacking Team Mac OSX 64位 Shellcode 技术分析https://security.tencent.com/index.php/blog/msg/89
Hacking Team 武器库研究(五):Mac OSX 64位 Shellcode 技术分析http://riusksk.me/2015/07/15/Hacking-Team-%E6%AD%A6%E5%99%A8%E5%BA%93%E7%A0%94%E7%A9%B6%EF%BC%88%E4%BA%94%EF%BC%89%EF%BC%9AMac-OSX-64%E4%BD%8D-Shellcode-%E6%8A%80%E6%9C%AF%E5%88%86%E6%9E%90/
[原创]格盘的shellcode分析https://bbs.pediy.com/thread-201485.htm
[原创]解析coff文件之提取shellcode代码https://bbs.pediy.com/thread-198188.htm
Diving into a Silverlight Exploit and Shellcode – Analysis and Techniques | Check Point Software Bloghttps://blog.checkpoint.com/2015/01/08/diving-into-a-silverlight-exploit-and-shellcode-analysis-and-techniques-3/
Analyzing Shellcode Extracted from Malicious RTF Documentshttps://digital-forensics.sans.org/blog/2014/12/23/analyzing-shellcode-extracted-from-malicious-rtf-other-documents
某EXCEL漏洞样本shellcode分析http://blog.jowto.com/?p=81
RIG Exploit Kit - Shellcode analysishttp://thembits.blogspot.com/2014/12/rig-exploit-kit-shellcode-analysis.html
Adventures with Radare2 #1: A Simple Shellcode Analysishttp://radare.today/posts/adventures-with-radare2-1-a-simple-shellcode-analysis/
Adventures with Radare2 #1: A Simple Shellcode Analysishttps://radareorg.github.io/blog/posts/adventures-with-radare2-1-a-simple-shellcode-analysis/
[原创]一段 shellcode 代码的分析https://bbs.pediy.com/thread-190214.htm
SLAE Assignment 5: Shellcode Analysishttps://govolution.wordpress.com/2014/01/24/slae-assignment-5-shellcode-analysis/
[原创]简单Shellcode的详细分析https://bbs.pediy.com/thread-142689.htm
한글 제로데이 쉘코드 간략 분석 (Quick analyzing HanGul 0day shellcode)https://beistlab.wordpress.com/2011/09/27/hangul_0day_is_used_for_targeted_attacks/
[原创]POC分析助手-ShellcodeDumperhttps://bbs.pediy.com/thread-131265.htm
[原创]一个word溢出样本的shellcode分析https://bbs.pediy.com/thread-130249.htm
[原创]CVE-2006-2389漏洞shellcode解析https://bbs.pediy.com/thread-121380.htm
[原创]CVE-2010-1297漏洞shellcode简析https://bbs.pediy.com/thread-121236.htm
Crypto-Analysis in Shellcode Detectionhttps://www.forcepoint.com/blog/security-labs/crypto-analysis-shellcode-detection
PDF file loader to extract and analyse shellcodehttp://www.hexblog.com/?p=110
[原创]windows下的shellcode剖析浅谈https://bbs.pediy.com/thread-99007.htm
Shellcode Analysis via MSEC Debugger Extensionshttps://msrc-blog.microsoft.com/2009/06/05/shellcode-analysis-via-msec-debugger-extensions/
Ossim: Shellcode Detection and Analysishttps://www.alienvault.com/blogs/labs-research/ossim-shellcode-detection-and-analysis
[原创]一个word溢出样本ShellCode的分析https://bbs.pediy.com/thread-75517.htm
Static analysis of Shellcode - Part 2https://isc.sans.edu/forums/diary/Static+analysis+of+Shellcode+Part+2/4972/
Static analysis of Shellcodehttps://isc.sans.edu/forums/diary/Static+analysis+of+Shellcode/4970/
[原创]flash漏洞所用shellcode的分析https://bbs.pediy.com/thread-65907.htm
[技术专题]软件漏洞分析入门_6_初级shellcode_定位缓冲区https://bbs.pediy.com/thread-56755.htm
[原创]一份shellcode的详细分析https://bbs.pediy.com/thread-46068.htm
Shellcode Analysishttp://www.msreverseengineering.com/blog/2014/6/22/shellcode-analysis
[原创]用softice对doc捆绑木马或exe文件的程序的shellcode分析https://bbs.pediy.com/thread-34664.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#bypassxxx
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#av
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-10
hackplayers/salsa-toolshttps://github.com/hackplayers/salsa-tools
mr-un1k0d3r/unibyavhttps://github.com/mr-un1k0d3r/unibyav
arno0x/shellcodewrapperhttps://github.com/arno0x/shellcodewrapper
hvqzao/foolavchttps://github.com/hvqzao/foolavc
k8gege/scrunhttps://github.com/k8gege/scrun
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-10
远控免杀从入门到实践(8)-shellcode免杀实践https://www.freebuf.com/articles/system/228233.html
那些shellcode免杀总结https://xz.aliyun.com/t/7170
shellcode加密过杀软https://xz.aliyun.com/t/6995
绕过杀软:通过网络接收ShellCode的无文件攻击方式与检测方法https://www.4hou.com/technology/16845.html
使用名为 Maru 的哈希函数创建permutable API hash,逃避杀软检测https://modexp.wordpress.com/2017/08/05/shellcode-maru-hash/
免杀的艺术:史上最全的汇编Shellcode的技巧(三)http://www.4hou.com/technology/3893.html
反检测的艺术(Part 3:Shellcode Alchemy)https://pentest.blog/art-of-anti-detection-3-shellcode-alchemy/
使用shellcode打造MSF免杀payloadhttp://www.91ri.org/14240.html
encode msf shellcode绕过杀毒http://www.91ri.org/6877.html
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-11
cryptolok/morphaeshttps://github.com/cryptolok/morphaes
infosecn1nja/maliciousmacromsbuildhttps://github.com/infosecn1nja/maliciousmacromsbuild
rvn0xsy/cooolis-mshttps://github.com/rvn0xsy/cooolis-ms
fireeye/duedlligencehttps://github.com/fireeye/duedlligence
manojcode/foxit-reader-rce-with-virualalloc-and-shellcode-for-cve-2018-9948-and-cve-2018-9958https://github.com/manojcode/foxit-reader-rce-with-virualalloc-and-shellcode-for-cve-2018-9948-and-cve-2018-9958
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-11
红蓝对抗之如何利用Shellcode来躲避安全检测https://www.freebuf.com/articles/system/216742.html
如何利用OOB数据绕过防火墙对shellcode的拦截https://www.anquanke.com/post/id/173610/
[翻译]English Shellcode - 散文化Shellcode - 绕过对有效载荷的静态检测的思路https://bbs.pediy.com/thread-229634.htm
[原创][原创]给shellcode找块福地- 通过VDSO绕过PXNhttps://bbs.pediy.com/thread-220057.htm
Windows Shellcode学习笔记——利用VirtualAlloc绕过DEPhttp://www.4hou.com/technology/4093.html
Windows Shellcode学习笔记——通过VirtualProtect绕过DEPhttp://www.4hou.com/technology/3943.html
Windows Shellcode学习笔记——利用VirtualAlloc绕过DEPhttps://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E5%88%A9%E7%94%A8VirtualAlloc%E7%BB%95%E8%BF%87DEP/
Windows Shellcode学习笔记——利用VirtualAlloc绕过DEPhttps://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E5%88%A9%E7%94%A8VirtualAlloc%E7%BB%95%E8%BF%87DEP/
Windows Shellcode学习笔记——通过VirtualProtect绕过DEPhttps://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E9%80%9A%E8%BF%87VirtualProtect%E7%BB%95%E8%BF%87DEP/
Windows Shellcode学习笔记——通过VirtualProtect绕过DEPhttps://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E9%80%9A%E8%BF%87VirtualProtect%E7%BB%95%E8%BF%87DEP/
[原创]一种反检测的Shellcode GetPC方法Flush GetPChttps://bbs.pediy.com/thread-154689.htm
Bypassing EMET’s EAF with custom shellcode using kernel pointerhttp://www.greyhathacker.net/?p=483
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#arm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-12
odzhan/shellcodehttps://github.com/odzhan/shellcode
therealsaumil/arm_shellcodehttps://github.com/therealsaumil/arm_shellcode
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-12
#HITB2019AMS D1T1 - Make ARM Shellcode Great Again - Saumil Shahhttps://www.youtube.com/watch?v=c_jUELOScLc
Shellcode for IoT: A Password-Protected Reverse Shell (Linux/ARM)https://medium.com/p/a18fcda4853b
Why is My Perfectly Good Shellcode Not Working?: Cache Coherency on MIPS and ARMhttps://blog.senr.io/blog/why-is-my-perfectly-good-shellcode-not-working-cache-coherency-on-mips-and-arm
Hack.lu 2018: Make ARM Shellcode Great Again - Saumil Udayan Shahhttps://www.youtube.com/watch?v=9tx293lbGuc
ARM 汇编初学者指南https://modexp.wordpress.com/2018/02/04/arm-crypto/
Shellcode: Linux ARM (AArch64)https://modexp.wordpress.com/2017/09/11/shellcode-linux-aarch64/
Shellcode: Linux ARM Thumb modehttps://modexp.wordpress.com/2017/09/09/shellcode-linux-arm-thumb/
[1608.03415] ARMv8 Shellcodes from 'A' to 'Z'https://arxiv.org/abs/1608.03415
Getting Shellcode from ARM Binarieshttps://osandamalith.com/2015/07/02/getting-shellcode-from-arm-binaries/
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#其他
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#工具-13
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#收集
nullsecuritynet/toolshttps://github.com/nullsecuritynet/tools
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#新添加
mattifestation/pic_bindshellhttps://github.com/mattifestation/pic_bindshell
secretsquirrel/fidohttps://github.com/secretsquirrel/fido
ixty/xarch_shellcodehttps://github.com/ixty/xarch_shellcode
kgretzky/python-x86-obfuscatorhttps://github.com/kgretzky/python-x86-obfuscator
osirislab/shellcodehttps://github.com/osirislab/Shellcode
tombkeeper/shellcode_template_in_chttps://github.com/tombkeeper/shellcode_template_in_c
mariovilas/shellcode_toolshttps://github.com/mariovilas/shellcode_tools
zznop/pop-nedryhttps://github.com/zznop/pop-nedry
scorchsecurity/systormhttps://github.com/scorchsecurity/systorm
ohjeongwook/shellcodeemulatorhttps://github.com/ohjeongwook/shellcodeemulator
djhohnstein/scatterbrainhttps://github.com/djhohnstein/scatterbrain
k2/admmutatehttps://github.com/k2/admmutate
buffer/libemuhttps://github.com/buffer/libemu
devzero2000/shellcoderhandbookhttps://github.com/devzero2000/shellcoderhandbook
t00sh/assemblyhttps://github.com/t00sh/assembly
p0cl4bs/shellcodeshttps://github.com/p0cl4bs/shellcodes
offsecginger/pythonaesobfuscatehttps://github.com/offsecginger/pythonaesobfuscate
hellman/shtesthttps://github.com/hellman/shtest
laginimaineb/waroftheworldshttps://github.com/laginimaineb/waroftheworlds
desword/shellcode_toolshttps://github.com/desword/shellcode_tools
sh3llc0d3r1337/windows_reverse_shell_1https://github.com/sh3llc0d3r1337/windows_reverse_shell_1
mortenschenk/token-stealing-shellcodehttps://github.com/mortenschenk/token-stealing-shellcode
csandker/inmemoryshellcodehttps://github.com/csandker/inmemoryshellcode
skybulk/bin2schttps://github.com/skybulk/bin2sc
mipu94/broids_unicornhttps://github.com/mipu94/broids_unicorn
hacksysteam/shellcodeofdeathhttps://github.com/hacksysteam/shellcodeofdeath
embedi/tcl_shellcodehttps://github.com/embedi/tcl_shellcode
ufrisk/shellcode64https://github.com/ufrisk/shellcode64
osandamalith/shellcodeshttps://github.com/osandamalith/shellcodes
rootkitsmm/winio-vidixhttps://github.com/rootkitsmm/winio-vidix
tophertimzen/shellcodetesterhttps://github.com/tophertimzen/shellcodetester
zerosum0x0/slae64https://github.com/zerosum0x0/slae64
zerosteiner/crimson-forgehttps://github.com/zerosteiner/crimson-forge
osandamalith/vbshellcodehttps://github.com/osandamalith/vbshellcode
danielhenrymantilla/shellcode-factoryhttps://github.com/danielhenrymantilla/shellcode-factory
pinkp4nther/shellcodeshttps://github.com/pinkp4nther/shellcodes
m0rv4i/ridgwayhttps://github.com/m0rv4i/ridgway
bruce30262/x86_shellcode_tutorialhttps://github.com/bruce30262/x86_shellcode_tutorial
hamza-megahed/pentest-with-shellcodehttps://github.com/hamza-megahed/pentest-with-shellcode
compilepeace/kaal_bhairavhttps://github.com/compilepeace/kaal_bhairav
nullarray/shellwarehttps://github.com/nullarray/shellware
egebalci/selfdefensehttps://github.com/EgeBalci/SelfDefense
1project/scanrhttps://github.com/1project/scanr
hc0d3r/scdumphttps://github.com/hc0d3r/scdump
eahlstrom/ucui-unicornhttps://github.com/eahlstrom/ucui-unicorn
breaktoprotect/shellcarverhttps://github.com/breaktoprotect/shellcarver
hoainam1989/shellcodehttps://github.com/hoainam1989/shellcode
mortenschenk/acl_edithttps://github.com/mortenschenk/acl_edit
lnslbrty/bufflowhttps://github.com/lnslbrty/bufflow
degrigis/exploitationhttps://github.com/degrigis/exploitation
govolution/win32shellcodehttps://github.com/govolution/win32shellcode
theevilbit/shellcodehttps://github.com/theevilbit/shellcode
govolution/moreshellcodehttps://github.com/govolution/moreshellcode
hamza-megahed/shellcodehttps://github.com/hamza-megahed/shellcode
orf53975/rig-exploit-for-cve-2018-8174https://github.com/orf53975/rig-exploit-for-cve-2018-8174
shayanzare/obj2shellcodehttps://github.com/shayanzare/obj2shellcode
stephenbradshaw/shellcodehttps://github.com/stephenbradshaw/shellcode
push4d/shellcode-alfanumerico---spawn-bin-sh-elf-x86-https://github.com/push4d/shellcode-alfanumerico---spawn-bin-sh-elf-x86-
skylined/w32-bind-ngs-shellcodehttps://github.com/skylined/w32-bind-ngs-shellcode
felixzhang00/shellcode_examplehttps://github.com/felixzhang00/shellcode_example
orangepirate/cve-2018-9948-9958-exphttps://github.com/orangepirate/cve-2018-9948-9958-exp
quantumvm/forkshellcodehttps://github.com/quantumvm/forkshellcode
sh3llc0d3r1337/slae32-polymorphic-shellcodeshttps://github.com/sh3llc0d3r1337/slae32-polymorphic-shellcodes
wjlandryiii/shellcodehttps://github.com/wjlandryiii/shellcode
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#其他-1
secretsquirrel/the-backdoor-factoryhttps://github.com/secretsquirrel/the-backdoor-factory
trustedsec/unicornhttps://github.com/trustedsec/unicorn
endgameinc/xorihttps://github.com/endgameinc/xori
trustedsec/metersshhttps://github.com/trustedsec/meterssh
hasherezade/hollows_hunterhttps://github.com/hasherezade/hollows_hunter
outflanknl/excel4-dcomhttps://github.com/outflanknl/excel4-dcom
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#文章-13
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#新添加-1
通过Mono(跨平台.NET运行环境)执行shellcodehttps://3gstudent.github.io/3gstudent.github.io/%E9%80%9A%E8%BF%87Mono(%E8%B7%A8%E5%B9%B3%E5%8F%B0.NET%E8%BF%90%E8%A1%8C%E7%8E%AF%E5%A2%83)%E6%89%A7%E8%A1%8Cshellcode/
通过Boolang语言执行shellcode的利用分析https://3gstudent.github.io/3gstudent.github.io/%E9%80%9A%E8%BF%87Boolang%E8%AF%AD%E8%A8%80%E6%89%A7%E8%A1%8Cshellcode%E7%9A%84%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90/
Early Security Stories — Green Shellcode Contesthttps://medium.com/p/c9aa151b441c
shellcode 的艺术https://xz.aliyun.com/t/6645
Running Shellcode Directly in Chttps://osandamalith.com/2019/08/27/running-shellcode-directly-in-c/
ret2shellcode challengehttps://code610.blogspot.com/2019/08/ret2shellcode-challenge.html
Malicious Input: How Hackers Use Shellcodehttps://www.sentinelone.com/blog/malicious-input-how-hackers-use-shellcode/
Those Pesky Powershell Shellcode’s And How To Understand Themhttps://pcsxcetrasupport3.wordpress.com/2019/07/07/those-pesky-powershell-shellcodes-and-how-to-understand-them/
A Shellcode Ideahttps://www.gironsec.com/blog/2019/07/a-shellcode-idea/
Expiring Shellcode updatehttps://www.gironsec.com/blog/2019/06/expiring-shellcode-update/
Solving MalwareTech Shellcode challenges with some radare2 magic!https://medium.com/p/b91c85babe4b
Shellcode to Dump the Lsass Processhttps://osandamalith.com/2019/05/11/shellcode-to-dump-the-lsass-process/
Let's Learn: Dissecting Operation ShadowHammer Shellcode Internals in crt_ExitProcesshttps://www.vkremez.com/2019/03/lets-learn-dissecting-operation.html
A Trinity of Shellcode, AES & Gohttps://medium.com/p/f6cec854f992
One-Way Shellcode for firewall evasion using Out Of Band datahttps://www.youtube.com/watch?v=wbG7M_Z7GRk
One-Way Shellcode for firewall evasion using Out Of Band datahttps://www.shelliscoming.com/2019/03/one-way-shellcode-for-firewall-evasion.html
A look at a bmp file with embedded shellcodehttps://pcsxcetrasupport3.wordpress.com/2019/03/02/a-look-at-a-bmp-file-with-embedded-shellcode/
FreeFloat FTP (custom shellcode)http://fuzzysecurity.com/exploits/12.html
Windows XP PRO SP3 - Full ROP calc shellcodehttp://fuzzysecurity.com/exploits/ropshell2.html
Micropoor_shellcode for payload backdoorhttps://micropoor.blogspot.com/2019/01/micropoorshellcode-for-payload-backdoor.html
Maldoc with Nonfunctional Shellcode, (Wed, Jan 2nd)https://www.ironcastle.net/maldoc-with-nonfunctional-shellcode-wed-jan-2nd/
Maldoc with Nonfunctional Shellcodehttps://isc.sans.edu/forums/diary/Maldoc+with+Nonfunctional+Shellcode/24478/
Beginner Reversing #3 (Shellcode2 & Lab Overview)https://www.youtube.com/watch?v=jm4DmdygLvw
Beginner Reversing #2 (Shellcode1 & MEMZ Malware)https://www.youtube.com/watch?v=b0WQwCQGjv4
Custom Shellcode Crypter – SLAE Exam Assignment #7https://www.doyler.net/security-not-included/custom-shellcode-crypter
Polymorphic Shellcode – SLAE Exam Assignment #6https://www.doyler.net/security-not-included/polymorphic-shellcode
Reversing shellcode using blobrunner and Ollyhttp://malwarenailed.blogspot.com/2018/09/reversing-shellcode-using-blobrunner.html
MMFML-powershell-shellcodehttp://www.secist.com/archives/7055.html
Shellcode Encoding – Random Bytewise XOR (SLAE Exam #4)https://www.doyler.net/security-not-included/shellcode-encoding-random-bytewise-xor
Tản mạn về edit shellcode của metasploithttps://medium.com/p/8b8992ebbf39
Use-after-free (UAF) Vulnerability CVE-2018-8373 in VBScript Engine Affects Internet Explorer to Run Shellcodehttps://blog.trendmicro.com/trendlabs-security-intelligence/use-after-free-uaf-vulnerability-cve-2018-8373-in-vbscript-engine-affects-internet-explorer-to-run-shellcode/
Egg Hunter Shellcode – SLAE Exam Assignment #3https://www.doyler.net/security-not-included/egg-hunter-shellcode
Shell Reverse TCP Shellcode – SLAE Exam Assignment #2https://www.doyler.net/security-not-included/shell-reverse-tcp-shellcode
Shell Bind TCP Shellcode – SLAE Exam Assignment #1https://www.doyler.net/security-not-included/shell-bind-tcp-shellcode
[原创]windows下shellcode提取模板的实现https://bbs.pediy.com/thread-229398.htm
Hello World Shellcode – Now for the fun part!https://www.doyler.net/security-not-included/hello-world-shellcode
Windows reuse shellcode based on socket's lifetimehttps://www.shelliscoming.com/2018/06/windows-reuse-shellcode-based-on.html
溢出过程需要的shellcode测试https://xz.aliyun.com/t/2349
smap: Shellcode mapperhttp://www.pentestingexperts.com/smap-shellcode-mapper-2/
隐藏Metasploit Shellcode, 躲避Windows Defender检测https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/
Linux x86 Polymorphic Shellcodehttps://www.sploitspren.com/2018-04-20-Linux-x86-Polymorphic-Shellcode/
Linux x86 Polymorphic Shellcodehttps://www.absolomb.com/2018-04-20-Linux-x86-Polymorphic-Shellcode/
Cisco ios shellcode: all-in-one译文https://paper.seebug.org/569/
Coding art in shellcode(3)https://xz.aliyun.com/t/2245
Coding art in shellcode(2)https://xz.aliyun.com/t/2244
Coding art in shellcode(1)https://xz.aliyun.com/t/2243
Windows(x86与x64) Shellcode技术研究https://www.anquanke.com/post/id/97601/
Improving custom shellcode detectionhttp://trackwatch.com/improving-custom-shellcode-detection/
Debugging shellcode using BlobRunner and IDA Prohttps://www.youtube.com/watch?v=q9q8dy-2Jeg
Egg Hunting:一个非常短的shellcodehttps://www.anquanke.com/post/id/87321/
可以当作推文发送的 x86 Windows 反向 Shellhttps://modexp.wordpress.com/2017/11/16/tweetable-shellcode-windows/
[CODEBREAKER] Présentation de la détection des shellcodes encodés sur GATEWATCHER sur Windows Server 2008 R2 (Version 2.X minimum)http://trackwatch.com/codebreaker-presentation-de-la-detection-des-shellcodes-encodes-sur-gatewatcher-sur-windows-server-2008-r2-version-2-x-minimum/
A patch for PowerSploit’s Invoke-Shellcode.ps1https://techblog.mediaservice.net/2017/11/a-patch-for-powersploits-invoke-shellcode-ps1/
用TEB结构实现ShellCode的通用性http://www.freebuf.com/articles/system/150474.html
[CODEBREAKER] Présentation de la détection des shellcodes encodés sur GATEWATCHER sur Linux (Version 2.X minimum)http://trackwatch.com/codebreaker-presentation-de-la-detection-des-shellcodes-encodes-sur-gatewatcher-sur-linux-version-2-x-minimum/
[CODEBREAKER] Présentation de la détection des shellcodes custom non encodés sur GATEWATCHER sur Windows XP (Version 2.5 minimum)http://trackwatch.com/codebreaker-presentation-de-la-detection-des-shellcodes-custom-non-encodes-sur-gatewatcher-sur-windows-xp-version-2-5-minimum/
Shellcode另类使用方式https://xz.aliyun.com/t/56
HITB GSEC CTF Win Pwn解题全记录之babyshellcodehttps://www.anquanke.com/post/id/86717/
HITB GSEC CTF Win Pwn 解题全记录之 babyshellcodehttps://paper.seebug.org/378/
通过Shellcode聚类识别定向攻击(APT)相关的恶意代码https://www.anquanke.com/post/id/86700/
Let's Learn: Preparing Shellcode in NASMhttps://www.vkremez.com/2017/08/preparing-shellcode-in-nasm.html
教你如何使用分组密码对shellcode中的windows api字符串进行加密http://www.4hou.com/info/news/7070.html
Extract Shellcode from Fileless Malware like a Prohttps://www.youtube.com/watch?v=jbieGfML0Bs
Shellcode: The hunt for GetProcAddresshttps://modexp.wordpress.com/2017/06/21/shellcode-getprocaddress/
手把手简易实现shellcode及详解http://blog.nsfocus.net/simple-realization-hand-handle-shellcode-detailed-explanation/
[翻译]Shellcode:x86优化 part 1https://bbs.pediy.com/thread-218410.htm
Shellcode: x86 优化方案(part 1)。Part 1 包括4部分:变量/寄存器的声明和初始化、测试变量/寄存器的值、条件跳转和控制流、字符转换https://modexp.wordpress.com/2017/06/07/x86-trix-one/
ShellCode入门(提取ShellCode)http://www.secist.com/archives/3538.html
任意程序添加ShellCodehttp://www.secist.com/archives/3472.html
Linux/x86 - Disable ASLR Shellcode (71 bytes)http://www.abatchy.com/2017/05/linuxx86-disable-aslr-shellcode-71-bytes
Shellcode reduction tips (x86)http://www.abatchy.com/2017/04/shellcode-reduction-tips-x86
[原创][shellcode框架(一)] 认识shellcode,部署shellcode开放框架https://bbs.pediy.com/thread-216608.htm
探索基于Windows 10的Windows内核Shellcode(Part 4)https://www.anquanke.com/post/id/85770/
Windows Kernel Shellcode on Windows 10 – Part 4 - There is No Codehttps://improsec.com/blog/windows-kernel-shellcode-on-windows-10-part-4-there-is-no-code
探索基于Windows 10的Windows内核Shellcode(Part 3)https://www.anquanke.com/post/id/85735/
智能逃避IDS——RSA非对称多态SHELLCODEhttps://www.anquanke.com/post/id/85711/
Windows Shellcode学习笔记——Shellcode的提取与测试http://www.4hou.com/technology/3623.html
Windows Kernel Shellcode on Windows 10 – Part 3https://improsec.com/blog/windows-kernel-shellcode-on-windows-10-part-3
探索基于Windows 10的Windows内核Shellcode(Part 2)https://www.anquanke.com/post/id/85669/
探索基于Windows 10的Windows内核Shellcode(Part 1)https://www.anquanke.com/post/id/85666/
反侦测的艺术part3:shellcode炼金术https://www.anquanke.com/post/id/85648/
Windows Shellcode学习笔记——栈溢出中对jmp esp的利用与优化http://www.4hou.com/technology/3655.html
Windows Kernel Shellcode on Windows 10 – Part 2https://improsec.com/blog/windows-kernel-shellcode-on-windows-10-part-2
Windows Shellcode学习笔记——shellcode在栈溢出中的利用与优化http://www.4hou.com/technology/3654.html
Windows Shellcode学习笔记——栈溢出中对jmp esp的利用与优化https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B8%AD%E5%AF%B9jmp-esp%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E4%BC%98%E5%8C%96/
Shellcode to Scroll your Desktop Vertically and Horizontallyhttps://osandamalith.com/2017/03/02/shellcode-to-scroll-your-desktop-vertically-and-horizontally/
[原创]PE2Shellcodehttps://bbs.pediy.com/thread-216034.htm
Windows Shellcode学习笔记——栈溢出中对jmp esp的利用与优化https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B8%AD%E5%AF%B9jmp-esp%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E4%BC%98%E5%8C%96/
Shellcode to Scroll Your Desktop Horizontallyhttps://osandamalith.com/2017/02/28/shellcode-to-scroll-your-desktop-horizontally/
Shellcode to Invert Colorshttps://osandamalith.com/2017/02/28/shellcode-to-invert-colors/
Windows Kernel Shellcode on Windows 10 – Part 1https://improsec.com/blog/windows-kernel-shellcode-on-windows-10-part-1
Shellcode Builder: Shell Factoryhttps://n0where.net/shellcode-builder-shell-factory
Windows Shellcode学习笔记——shellcode在栈溢出中的利用与优化https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-shellcode%E5%9C%A8%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B8%AD%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E4%BC%98%E5%8C%96/
Windows Shellcode学习笔记——shellcode在栈溢出中的利用与优化https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-shellcode%E5%9C%A8%E6%A0%88%E6%BA%A2%E5%87%BA%E4%B8%AD%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E4%BC%98%E5%8C%96/
X86 Shellcode代码混淆(一)http://www.csyssec.org/20170223/obfuscation1/
Shellcode: Dual Mode (x86 + amd64) Linux shellcodehttps://modexp.wordpress.com/2017/02/20/shellcode-linux-x84/
Windows Shellcode学习笔记——shellcode的提取与测试https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-shellcode%E7%9A%84%E6%8F%90%E5%8F%96%E4%B8%8E%E6%B5%8B%E8%AF%95/
Windows Shellcode学习笔记——shellcode的提取与测试https://3gstudent.github.io/3gstudent.github.io/Windows-Shellcode%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0-shellcode%E7%9A%84%E6%8F%90%E5%8F%96%E4%B8%8E%E6%B5%8B%E8%AF%95/
Shellcode: Dual mode PIC for x86 (Reverse and Bind Shells for Windows)https://modexp.wordpress.com/2017/01/24/shellcode-x84/
Shellcode: Solaris x86https://modexp.wordpress.com/2017/01/23/shellcode-solaris/
Shellcode: Mac OSX amd64https://modexp.wordpress.com/2017/01/21/shellcode-osx/
Shellcode: Resolving API addresses in memoryhttps://modexp.wordpress.com/2017/01/15/shellcode-resolving-api-addresses/
远程漏洞利用:无需借助套接字的Shellcodehttps://www.anquanke.com/post/id/85306/
NC后门技术(shellcode版)https://www.anquanke.com/post/id/85216/
Shellcode: A Windows PIC using RSA-2048 key exchange, AES-256, SHA-3https://modexp.wordpress.com/2016/12/26/windows-pic/
使用PLC作为payload/shellcode分发系统(含演示视频)https://www.anquanke.com/post/id/85159/
Shellcode. I’ll Call you back.http://www.hexacorn.com/blog/2016/12/17/shellcode-ill-call-you-back/
Modbus Stager: Using PLCs as a payload/shellcode distribution systemhttp://www.shelliscoming.com/2016/12/modbus-stager-using-plcs-as.html
Shellcode Compiler - 一款易用的 Shellcode 编译工具https://paper.seebug.org/134/
VBA Shellcode To Test EMEThttps://www.youtube.com/watch?v=ACmcFanE658
VBA Shellcode and EMEThttps://isc.sans.edu/forums/diary/VBA+Shellcode+and+EMET/21705/
Synesthesia: Modern Shellcode Synthesis (Ekoparty 2016 Talk)http://www.msreverseengineering.com/blog/2016/11/8/synesthesia-modern-shellcode-synthesis-ekoparty-2016-talk
浅谈ASLR和Shellcode的那些事儿https://www.anquanke.com/post/id/84747/
Maldoc VBA: Shellcodehttps://www.youtube.com/watch?v=EJMkK05-Q1o
Study Notes Weekly No.2(Shellcode Via JScript & VBScript)https://3gstudent.github.io/3gstudent.github.io/Study-Notes-Weekly-No.2(Shellcode-Via-JScript-&-VBScript)/
Study Notes Weekly No.2(Shellcode Via JScript & VBScript)https://3gstudent.github.io/3gstudent.github.io/Study-Notes-Weekly-No.2(Shellcode-Via-JScript-&-VBScript)/
VB Dropper and Shellcode for Hancitor Reveal New Techniques Behihttps://unit42.paloaltonetworks.com/unit42-vb-dropper-and-shellcode-for-hancitor-reveal-new-techniques-behind-uptick/
openCTF 2016 - tyro_shellcode2http://uaf.io/exploitation/2016/08/05/openCTF-tyro_shellcode2.html
openCTF 2016 - tyro_shellcodehttp://uaf.io/exploitation/2016/08/05/openCTF-tyro_shellcode.html
Making your Shellcode Undetectable using .NEThttps://osandamalith.com/2016/08/01/making-your-shellcode-undetectable-using-net/
Kernel Hacking With HEVD Part 3 - The Shellcodehttps://sizzop.github.io/2016/07/07/kernel-hacking-with-hevd-part-3.html
X86 Shellcode Obfuscation - Part 3https://breakdev.org/x86-shellcode-obfuscation-part-3/
Gracker level7 (Ghost in the Shellcode!)https://paraschetal.in/gracker-level07
Threat Actors Employ COM Technology in Shellcode to Evade Detectionhttps://www.mcafee.com/blogs/other-blogs/mcafee-labs/threat-actors-employ-com-technology-shellcode-evade-detection/
Threat Actors Employ COM Technology in Shellcode to Evade Detectionhttps://securingtomorrow.mcafee.com/mcafee-labs/threat-actors-employ-com-technology-shellcode-evade-detection/
Shellcode: Detection between Windows/Linux/BSD on x86 architecturehttps://modexp.wordpress.com/2016/06/02/shellcode-detection/
Malicious Excel documents with macros running shellcodeshttp://blog.angelalonso.es/2016/05/malicious-excel-documents-vba-running.html
Hack Remote Windows 10 PC using Cypher (Adding Shellcode to PE files)http://www.hackingarticles.in/hack-remote-windows-10-pc-using-cypher-adding-shellcode-pe-files/
X86 Shellcode Obfuscation - Part 2https://breakdev.org/x86-shellcode-obfuscation-part-2/
X86 Shellcode Obfuscation - Part 1https://breakdev.org/x86-shellcode-obfuscation-part-1/
OWASP ZCR Shellcoderhttps://paraschetal.in/owasp-zsc
Shellcode: FreeBSD / OpenBSD amd64https://modexp.wordpress.com/2016/04/03/x64-shellcodes-bsd/
Shellcode: Linux amd64https://modexp.wordpress.com/2016/03/31/x64-shellcodes-linux/
George Nosenko — Cisco IOS shellcode — all-in-onehttps://www.youtube.com/watch?v=T1_TvqtO6y0
OWASP ZSC Shellcoder:定制个人专属Shellcodehttp://www.freebuf.com/sectool/95250.html
[原创]我也发一个自己写的reverse_bind shellcode代码https://bbs.pediy.com/thread-206152.htm
Android Shellcode Telnetd with Parametershttps://blog.csdn.net/autohacker/article/details/49838391
Windows bind shell universal shellcodehttp://ly0n.me/2015/09/26/windows-bind-shell-universal-shellcode/
Windows bind shell universal shellcodehttps://paumunoz.tech/2015/09/26/windows-bind-shell-universal-shellcode/
Creating OSX shellcodeshttp://theevilbit.blogspot.com/2015/09/creating-osx-shellcodes.html
Bind Shell – shellcode and sourcehttps://www.bigendiansmalls.com/bind-shell-shellcode-and-source/
Windows reverse shell universal shellcodehttp://ly0n.me/2015/08/29/windows-reverse-shell-universal-shellcode/
Windows reverse shell universal shellcodehttps://paumunoz.tech/2015/08/29/windows-reverse-shell-universal-shellcode/
WinExec calc.exe universal shellcodehttp://ly0n.me/2015/08/21/winexec-calc-exe-universal-shellcode/
WinExec calc.exe universal shellcodehttps://paumunoz.tech/2015/08/21/winexec-calc-exe-universal-shellcode/
OWASP ZeroDay Cyber Research Shellcoderhttps://n0where.net/owasp-zeroday-cyber-research-shellcoder
Shellcode Freebie!https://www.bigendiansmalls.com/shellcode-freebie/
Mainframe shellcodehttps://www.bigendiansmalls.com/mainframe-shellcode/
Detecting Shellcode Hidden in Malicious Fileshttps://digital-forensics.sans.org/blog/2015/06/28/detecting-shellcode
Shellcode Techniques in C++https://www.tophertimzen.com/blog/shellcodeTechniquesCPP/
Shifting from 32bit to 64bit Linux Shellcodehttps://govolution.wordpress.com/2015/04/21/shifting-from-32bit-to-64bit-linux-shellcode/
Dumping shellcode 64bit stylehttps://govolution.wordpress.com/2015/04/18/dumping-shellcode-64bit-style/
Shellcode in .NET - How the PEB Changeshttps://www.tophertimzen.com/blog/shellcodeDotNetPEB/
Running Shellcode in your Raspberry Pihttps://osandamalith.com/2015/03/05/running-shellcode-in-your-rasbperry-pi/
Examining Shellcode in a Debugger through Control of the Instruction Pointerhttps://digital-forensics.sans.org/blog/2014/12/30/taking-control-of-the-instruction-pointer
x64 Egg-Hunter Shellcode Stagerhttps://zerosum0x0.blogspot.com/2014/12/x64-egg-hunter-shellcode.html
x64 Linux Polymorphic execve() shellcodehttps://zerosum0x0.blogspot.com/2014/12/there-are-many-versions-of-execve.html
x64 Shellcode One-Time Pad Crypterhttps://zerosum0x0.blogspot.com/2014/12/x64-one-time-pad-shellcode-crypter.html
x64 Linux Polymorphic forkbomb shellcodehttps://zerosum0x0.blogspot.com/2014/12/on-shell-storm-there-is-simple-7-byte.html
x64 Linux Polymorphic read file shellcodehttps://zerosum0x0.blogspot.com/2014/12/x64-linux-polymorphic-read-file.html
x64 Linux reverse TCP connect shellcode (75 to 83 bytes, 88 to 96 with password)https://zerosum0x0.blogspot.com/2014/12/x64-linux-reverse-tcp-connect-shellcode.html
x64 Linux bind TCP port shellcode (80 bytes, 95 with password)https://zerosum0x0.blogspot.com/2014/12/x64-linux-bind-shellcode-81-bytes-96.html
Ghost in the Shellcode Teaser 2015: Lost To Timehttp://nebelwelt.net/blog/20141213-GitS-LostToTime.html
Windows x64 shellcode编写指南https://www.tophertimzen.com/blog/windowsx64Shellcode/
[原创]史上最小无需重定位的"格盘"ShellCodehttps://bbs.pediy.com/thread-194664.htm
Guest Diary: Didier Stevens - Shellcode Detection with XORSearchhttps://isc.sans.edu/forums/diary/Guest+Diary+Didier+Stevens+Shellcode+Detection+with+XORSearch/18929/
Svetlana Gaivoronski - Shellcode detection techniqueshttps://www.youtube.com/watch?v=bbzH-y93hq0
[原创]根据一个通用的shellcode 还原的一段汇编代码https://bbs.pediy.com/thread-192293.htm
Shellcode Binder for Windows 64 Bithttps://govolution.wordpress.com/2014/07/26/shellcode-binder-for-windows-64-bit/
shutdown -h now Shellcodehttps://osandamalith.com/2014/07/03/shutdown-h-now-shellcode/
Chmod 0777 Polymorphic Shellcodehttps://osandamalith.com/2014/06/24/chmod-0777-polymorphic-shellcode/
Pasting Shellcode in GDB using Pythonhttps://parsiya.net/blog/2014-05-25-pasting-shellcode-in-gdb-using-python/
Ghost in the Shellcode: fuzzy (Pwnage 301)https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-fuzzy-pwnage-301
Two shellcodes and a bit of codehttp://0x90909090.blogspot.com/2014/03/two-shellcodes-and-bit-of-code.html
Obfuscated shellcode inside a malicious RTF documenthttps://zairon.wordpress.com/2014/03/06/obfuscated-shellcode-inside-a-malicious-rtf-document/
用C语言进一步优化Windows Shellcodehttp://www.freebuf.com/articles/system/27122.html
Shellcode Golf: Every Byte is Sacredhttps://blog.rapid7.com/2014/02/14/shellcode-golf/
Shellcode for deleting a filehttps://govolution.wordpress.com/2014/02/11/shellcode-for-deleting-a-file/
SLAE: Shellcode read and send filehttps://govolution.wordpress.com/2014/01/28/slae-shellcode-read-and-send-file/
Ghost in the Shellcode: gitsmsg (Pwnage 299)https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-gitsmsg-pwnage-299
SLAE Assignment 6: Polymorphic Shellcodehttps://govolution.wordpress.com/2014/01/26/slae-assignment-6-polymorphic-shellcode/
Ghost in the Shellcode: TI-1337 (Pwnable 100)https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100
[原创]揭示《shellcoder's handbook》中一个函数的运行机制https://bbs.pediy.com/thread-183257.htm
[原创]shellcode 版的 hello worldhttps://bbs.pediy.com/thread-182964.htm
A Shellter for your shellcode…http://www.anti-reversing.com/1257/
[原创]旧书重温:0day2[5]shellcode变形记https://bbs.pediy.com/thread-182551.htm
[Shellcode] MIPS Little Endian Reverse Shell Shellcode (Linux)http://infosec42.blogspot.com/2013/11/shellcode-mips-little-endian-reverse.html
Stdin reopen & execve /bin/sh shellcode for Linux/x86_64https://www.voidsecurity.in/2013/08/stdin-reopen-execve-binsh-shellcode-for.html
[Shellcode] MIPS Little Endian system() Shellcodehttp://infosec42.blogspot.com/2013/07/shellcode-mips-little-endian-system.html
[原创]分享用C语言写ShellCode的技术应用--拦截系统记事本工具的保存菜单https://bbs.pediy.com/thread-173634.htm
[原创]分享用C语言写ShellCode的实现源码https://bbs.pediy.com/thread-173358.htm
One-liner to only get the shellcode from objdumphttps://jumpespjump.blogspot.com/2013/06/only-getting-shellcode-from-objdump.html
[原创]新人ShellCode小总结,附带一个讨论问题https://bbs.pediy.com/thread-170748.htm
Binary to shellcodehttps://blog.techorganic.com/2013/03/02/binary-to-shellcode/
Ghost In The Shellcode 2013 CTF - Pwnable 100 - Question 8 Shiftd [Team xbios]https://www.voidsecurity.in/2013/02/ghost-in-shellcode-2013-ctf-pwnable-100.html
[原创]MAsM ShellCode 宏框架使用手册 CHMhttps://bbs.pediy.com/thread-160884.htm
Fun with AIX Shellcode and Metasploithttps://www.offensive-security.com/vulndev/aix-shellcode-metasploit/
Design and Implementation of Token Stealing Kernel Shellcode for Windows 8http://cawanblog.blogspot.com/2012/11/design-and-implementation-of-token.html
How To Build A Kernel Shellcode Design and Testing Platform For Windows 8 By Using Windbghttp://cawanblog.blogspot.com/2012/11/how-to-build-kernel-shellcode-design_5.html
[原创]ShellCodeToAsciihttps://bbs.pediy.com/thread-156913.htm
[原创] Shellcode In X64-3 Test Your Shellcodehttps://bbs.pediy.com/thread-155371.htm
[原创]Shellcode In X64-2Search Function using hashhttps://bbs.pediy.com/thread-155341.htm
[原创]Shellcode In X64-1Find Kernel32.dllhttps://bbs.pediy.com/thread-155336.htm
Network detection of x86 buffer overflow shellcodehttps://community.rsa.com/community/products/netwitness/blog/2012/08/22/network-detection-of-x86-buffer-overflow-shellcode
ShellCode的调试方法和常见问题的解决方法https://blog.csdn.net/magictong/article/details/7768026
[原创] 也学构造字母shellcodehttps://bbs.pediy.com/thread-151251.htm
Embedding a shellcode in a PE filehttp://joxeankoret.com/blog/2012/05/06/embedding-a-shellcode-in-a-pe-file/
文件类漏洞ShellCode的查找http://www.91ri.org/2937.html
Phishing with obfuscated javascript, shellcode and malwarehttps://isc.sans.edu/forums/diary/Phishing+with+obfuscated+javascript+shellcode+and+malware/12700/
Linux/x86 Polymorphic ShellCode – setuid(0)+setgid(0)+add user ‘iph’ without password to /etc/passwdhttp://www.91ri.org/2714.html
[原创]我的第一次vc转shellcode历程https://bbs.pediy.com/thread-142657.htm
White Hat Shellcode Workshop: Enforcing Permanent DEPhttps://www.youtube.com/watch?v=UUQz5JsWirI
[原创]OllyDgb下的shellcode提取插件https://bbs.pediy.com/thread-138963.htm
[求助]在shellcode中遇到疑惑的浮点指令https://bbs.pediy.com/thread-135162.htm
[原创]Dadong's JSXX 0.39 VIP所用shellcode调试https://bbs.pediy.com/thread-132109.htm
The Shellcode Lab - Black Hat Training Coursehttps://www.purehacking.com/blog/ty-miller/the-shellcode-lab-black-hat-training-course
Generic CC1110 Sniffing, Shellcode, and iClickershttp://travisgoodspeed.blogspot.com/2011/01/generic-cc1110-sniffing-shellcode-and.html
[原创]shellcode框架,纯属娱乐https://bbs.pediy.com/thread-125853.htm
Hiding Shellcode in Plain Sighthttp://e-omidfar.blogspot.com/2010/11/hiding-shellcode-in-plain-sight.html
[原创]众里寻他千百度----文件类漏洞ShellCode的查找https://bbs.pediy.com/thread-121045.htm
[原创]纯字母shellcode揭秘https://bbs.pediy.com/thread-113177.htm
[原创]基于shellcode感染方式的组合病毒研究https://bbs.pediy.com/thread-110429.htm
Weaponizing dnscat with shellcode and Metasploithttps://blog.skullsecurity.org/2010/weaponizing-dnscat-with-shellcode-and-metasploit
Morphing shellcode using CFGs and SAThttps://sean.heelan.io/2009/06/02/model-checking-smt-solving-and-morphing-shellcode/
Not all shellcode locations are made equalhttps://sean.heelan.io/2009/05/13/not-all-shellcode-locations-are-made-equal/
[分享]贴一个MessageBox的shellcodehttps://bbs.pediy.com/thread-83968.htm
[原创]改写前辈的shellcode(delphi版)https://bbs.pediy.com/thread-80819.htm
Shellcode2Exehttp://edge-security.blogspot.com/2008/12/shellcode2exe.html
[原创]汇编打造最简单的shellcodehttps://bbs.pediy.com/thread-76204.htm
[原创]ShellCode Locator for IDA 5.2https://bbs.pediy.com/thread-72947.htm
[翻譯]SHELLCODE 設計解密https://bbs.pediy.com/thread-69385.htm
[原创]32字节的退出进程Shellcodehttps://bbs.pediy.com/thread-68560.htm
[原创]word 漏洞利用shellcode代码反汇编https://bbs.pediy.com/thread-68102.htm
[作品提交]ShellCode辅助工具https://bbs.pediy.com/thread-66656.htm
[原创]快速高效的写shellcodehttps://bbs.pediy.com/thread-65309.htm
[原创]shellcode之小小琢磨https://bbs.pediy.com/thread-60338.htm
[原创]完全不懂shellcode解第二阶段第一题https://bbs.pediy.com/thread-50721.htm
《The Shellcoder's handbook》第十九章_二进制审计:Hacking不公开源码的软件https://bbs.pediy.com/thread-40537.htm
《The Shellcoder's handbook》第十八章_跟踪漏洞https://bbs.pediy.com/thread-40164.htm
[注意]《The Shellcoder's Handbook》中的笔误https://bbs.pediy.com/thread-39968.htm
《The Shellcoder's handbook》第十七章_Instrumented Investigation:手工的方法https://bbs.pediy.com/thread-39775.htm
《The Shellcoder's handbook》第十六章_源码审计:在C-Based 语言里寻找漏洞https://bbs.pediy.com/thread-39586.htm
《The Shellcoder's handbook》第十五_Fuzzing的技巧https://bbs.pediy.com/thread-39220.htm
《The Shellcoder's handbook》第十三章_建立工作环境https://bbs.pediy.com/thread-38324.htm
《The Shellcoder's handbook》第十二章_破解HP Tru64 Unixhttps://bbs.pediy.com/thread-37937.htm
《The Shellcoder's handbook》第十一章_高级 Solaris 破解https://bbs.pediy.com/thread-37575.htm
《The Shellcoder's handbook》第十章_Solaris 破解入门https://bbs.pediy.com/thread-37269.htm
《The Shellcoder's handbook》第九章_战胜过滤器https://bbs.pediy.com/thread-36885.htm
《The Shellcoder's handbook》第八章_Windows 溢出https://bbs.pediy.com/thread-36535.htm
来看看WINRAR溢出漏洞吧,写个SHELLCODE就可以捆绑程序[注意]https://bbs.pediy.com/thread-36248.htm
《The Shellcoder's handbook》第七章_Windows Shellcodehttps://bbs.pediy.com/thread-36216.htm
《The Shellcoder's handbook》翻译汇总及勘误https://bbs.pediy.com/thread-35849.htm
《The Shellcoder's handbook》第六章_Windows的广阔原野https://bbs.pediy.com/thread-35847.htm
Sysenter shellcodehttp://em386.blogspot.com/2006/11/sysenter-shellcode.html
《The Shellcoder's handbook》第五章_堆溢出https://bbs.pediy.com/thread-35165.htm
《The Shellcoder's handbook》第四章_格式化串漏洞https://bbs.pediy.com/thread-34820.htm
《The Shellcoder's handbook》第三章_Shellcodehttps://bbs.pediy.com/thread-34433.htm
《The Shellcoder's handbook》第二章_栈溢出https://bbs.pediy.com/thread-33986.htm
《The Shellcoder's handbook》第一章_在开始之前https://bbs.pediy.com/thread-33670.htm
[原创]小议shellcoderhttps://bbs.pediy.com/thread-33205.htm
[原创]常用ShellCode Hash算法-Delphi内镶BASMhttps://bbs.pediy.com/thread-23563.htm
shellcode和我写的一个例子https://bbs.pediy.com/thread-19294.htm
https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#贡献
shellcode https://patch-diff.githubusercontent.com/topics/shellcode
shellcode-loader https://patch-diff.githubusercontent.com/topics/shellcode-loader
shellcode-development https://patch-diff.githubusercontent.com/topics/shellcode-development
shellcode-injection https://patch-diff.githubusercontent.com/topics/shellcode-injection
shellcode-analysis https://patch-diff.githubusercontent.com/topics/shellcode-analysis
shellcode-execute https://patch-diff.githubusercontent.com/topics/shellcode-execute
shellcode-encode https://patch-diff.githubusercontent.com/topics/shellcode-encode
shellcode-decode https://patch-diff.githubusercontent.com/topics/shellcode-decode
shellcode-convert https://patch-diff.githubusercontent.com/topics/shellcode-convert
Readme https://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources#readme-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources
Activityhttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/activity
216 starshttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/stargazers
7 watchinghttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/watchers
60 forkshttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2FalphaSeclab%2Fshellcode-resources&report=alphaSeclab+%28user%29
Releaseshttps://patch-diff.githubusercontent.com/alphaSeclab/shellcode-resources/releases
Packages 0https://patch-diff.githubusercontent.com/users/alphaSeclab/packages?repo_name=shellcode-resources
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.