🌸 Interactive shellcoding environment to easily craft shellcodes
-
Updated
Feb 26, 2021 - Python
🌸 Interactive shellcoding environment to easily craft shellcodes
📡🐧 Linux kernel syscall implementation tracker
ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Windows syscalls. ShellWasp is built for 32-bit, WoW64. ShellWasp 2.0 includes novel ways to invoke the syscall in WoW64.
Windows API (WinAPI) functions and system calls with categories in JSON format, including arguments (SAL notation) and more.
This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes
A fileless reverse shell and C2 framework leveraging direct syscalls, proxy tunneling, and ChaCha20 encryption for AV evasion.
Phoenix-Evasion-Research Framework is an advanced educational platform designed for cybersecurity researchers, red teams, and defensive security professionals. This framework demonstrates modern evasion techniques to help security practitioners understand, analyze, and improve defensive capabilities
IntentGuard is an online security system that detects behavioral intent drift in Linux processes using syscall sequences, graph representations, and self-supervised learning, enabling detection of stealthy and zero-day attacks without signatures.
Sistemas Operacionais (3º Ano) - closed
A CLI tool to inspect Linux system calls and generate assembly syscall stubs for x86 and x86_64 architectures.
Add a description, image, and links to the syscalls topic page so that developers can more easily learn about it.
To associate your repository with the syscalls topic, visit your repo's landing page and select "manage topics."