1. ShellabLinux and Windows shellcode enrichment utility
2. CanisrufusA stealthy Python based Windows backdoor that uses Github as a command and control server
5. ShellvmA collection of LLVM transform and analysis passes to write shellcode in regular C
6. FidoTeaching old shellcode new tricks
7. PwnshopExploit Development, Reverse Engineering & Cryptography
14. Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
15. ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
18. Shad0wA post exploitation framework designed to operate covertly on heavily monitored environments
20. Simple Polymorphic Engine Spe32Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.
21. RidgwayA quick tool for hiding a new process running shellcode.
24. Venomvenom - shellcode generator/compiler/handler (metasploit)
25. ProcjackPoC of injecting code into a running Linux process
26. ThugPython low-interaction honeyclient
27. Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
29. CemuCheap EMUlator: lightweight multi-architecture assembly playground
31. ModernishModernish is a library for writing robust, portable, readable, and powerful programs for POSIX-based shells and utilities.
32. ZeratoolAutomatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
34. Bddisasmbddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
35. ZscOWASP ZSC - Shellcode/Obfuscate Code Generator
37. DlinjectInject a shared library (i.e. arbitrary code) into a live linux process, without ptrace
40. Winreplx86 and x64 assembly "read-eval-print loop" shell for Windows
41. GdogA fully featured Windows backdoor that uses Gmail as a C&C server
42. Easy Linux PwnA set of Linux binary exploitation tasks for beginners on various architectures
43. V0ltSecurity CTF Toolkit (Not maintained anymore)
44. Cve 2017 11882CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.