shell
exploit
interactive
assembly
architecture
asm
assembler
keystone
capstone
pwn
ctf
shellcode
syscalls
exploitation
disassembly
dsm
syscall-table
dissassembler
shellcoding
common-shellcodes
-
Updated
Feb 27, 2019 - Python
Currently I have my own small sandbox application using Shockky but as there is no documentation yet for any of this, I should make something to demonstrate progress of the project. This will not replace unit tests of course. The program will probably just be a CLI which is able to dump the non-script resources (mentioned in #1 ) such as images and sounds for now atleast.