Este cheatsheet cobre técnicas práticas de exploração de binários, com foco em leaks de memória (stack, GOT), construção de ROP chains, e evasão de proteções modernas (canários, ASLR, DEP, NX). É projetado para engenheiros reversos e red teamers que querem conhecimento bruto, sem moralismo ou limitações. Todas as técnicas são explicadas com exemplos práticos, ferramentas do submundo, e truques sujos.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
""" | |
MEMORYHOOK PRO - Advanced Windows Injection Framework | |
Created by: Tr0p | |
LinkedIn: https://www.linkedin.com/in/marcos-tolosa/ | |
GitHub: https://github.com/marcostolosa/memoryhook-pro | |
Enterprise-grade solution for Windows process manipulation and hook injection. | |
Designed for cybersecurity professionals, malware analysts, and red team operators. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# | |
# Auto Stack BOF Exploit | |
# by Marcos 'Tr0p' Tolosa | |
from pwn import * | |
import argparse, sys |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// ╔══════════════════════════════════════════════════════════════════════════════════════════════════╗ | |
// ║ F0ST3AL ULTIMATE CHAOS EDITION ║ | |
// ║ Autor: Tr0p — O gênio caótico que ignora firewalls, strings, e até a quarta lei da termodinâmica ║ | |
// ║ Linguagem: C++23 com tempero de anarquia e STL descontrolada ║ | |
// ║ Objetivo: AULAS COM FINS EDUCACIONAIS! CUIDADO. ║ | |
// ╚══════════════════════════════════════════════════════════════════════════════════════════════════╝ | |
#include <iostream> | |
#include <fstream> | |
#include <string> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
""" | |
HTTP Stress Testing Tool - Educational & Authorized Pentest Only | |
Author: Security Research Team | |
Version: 2.0 Professional Edition | |
⚠️ AVISO LEGAL: Use APENAS com autorização escrita do proprietário do sistema | |
Violação = Crime (Lei 12.737/2012 - Brasil) | CFAA (EUA) | |
""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
DynWin32-ShellcodeProcessHollowing.ps1 performs shellcode based process hollowing using | |
dynamically looked up Win32 API calls. The script obtains the methods GetModuleHandle, | |
GetProcAddress and CreateProcess by using reflection. Afterwards it utilizes GetModuleHandle | |
and GetProcAddress to obtain the addresses of the other required Win32 API calls. | |
When all required Win32 API calls are looked up, it starts svchost.exe in a suspended state | |
and overwrites the entrypoint with the specified shellcode. Afterwards, the thread is resumed | |
and the shellcode is executed enveloped within the trusted svchost.exe process. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
' ******************************************************************************************************** | |
' | |
' VBA reverse shell that uses Win32 API calls. Most of the code was copied from the following resources: | |
' | |
' * https://stackoverflow.com/questions/8670391 | |
' * https://stackoverflow.com/questions/43197814 | |
' * https://renenyffenegger.ch/notes/development/languages/VBA/Win-API/examples/ | |
' | |
' The code demonstrates more complex usage example for calling Win32 API from VBA and should be used | |
' for educational purpose only. During development I was mainly interested whether the WSAData or the |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
import re | |
import sys | |
import argparse | |
class Xor: | |
''' | |
Helper class for performing xor operations. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#flag -lws2_32 | |
#include "winsock2.h" | |
struct WSADATA { | |
mut: | |
w_version u16 | |
w_high_version u16 | |
i_max_sockets u16 | |
i_max_udp_dg u16 | |
lp_vendor_info &string = 0 |
NewerOlder