Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.
-
Updated
Mar 11, 2023 - Assembly
A shell is a text-based terminal, used for manipulating programs and files. Shell scripts typically manage program execution.
Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.
ARM64 macOS assembly program for null-byte free shellcode
Code snippets for bare-metal malware development
SLAE Assignments
can convert EXE/DLL into position-independent shellcode
I'll post my custom shellcode I make here!
Several self-defense shellcodes
TheBhTiNjector is a filebinder that can concatenate two or more files of some extensions that preserves the integrity of the files and gives you the option of injecting shellcode into them.
An Assembly x86 code that shows Windows MessageBox kept as simple as possible.
SecurityTube Linux Assembly Expert x86 Exam
Windows x86_64bit shellcode written in Nasm
Shellcoder.py - simple script to automate shellcoding process and shellcode testing.
Cyber lab designed for analyzing shellcode and supporting malware analysis
This project contains methodology of creating position independent code that is used to extract shellcode from the generated binary. Position independent shellcode could be injected in any process for evading defenses and creating backdoors.
Created by Glenda Schroeder
Released 1965