RED TEAMReverse TCP Shellcode (Linux Shellcoding)“Linux Shellcoding for Hackers: A Step-by-Step Guide”Sep 7
Rajanikanth SugumarShellcode in PE FileEmbedding shellcode in a Portable Executable File and testing shellcode in C++Jan 15, 2023Jan 15, 2023
Aditya ChaudharySLAE 0x2: Linux/x86 Reverse ShellcodeGuidelines to create a reverse shellcode for x86 LinuxJan 27, 2019Jan 27, 2019
WhiteheartShellCoding : The syscall dilemmaShellcoding or simply exploit writing depends heavily the on syscall or system call for their success. OS architecture is designed in such…Nov 14, 2020Nov 14, 2020
RED TEAMReverse TCP Shellcode (Linux Shellcoding)“Linux Shellcoding for Hackers: A Step-by-Step Guide”Sep 7
Rajanikanth SugumarShellcode in PE FileEmbedding shellcode in a Portable Executable File and testing shellcode in C++Jan 15, 2023
Aditya ChaudharySLAE 0x2: Linux/x86 Reverse ShellcodeGuidelines to create a reverse shellcode for x86 LinuxJan 27, 2019
WhiteheartShellCoding : The syscall dilemmaShellcoding or simply exploit writing depends heavily the on syscall or system call for their success. OS architecture is designed in such…Nov 14, 2020
Aditya ChaudharySLAE 0x4: Shellcode EncoderGuidelines to create an Insertion Encoder for x86 Linux shellcodeFeb 5, 2019
J0hnr33s3Under Standing SysCallsHello Guys ! In this we are going to learn about the syscalls.Aug 7, 2020
Orhan YILDIRIMSLAE32 — Assingment-1 (bind_shell)http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/Jul 12, 2020