Shellcode
The Complete Shellcode & Vulnerability Development Reference Guide
Table of Contents
Introduction
Key Concepts
Linux Shellcode Development
Basic Linux execve("/bin/sh") Shellcode
Null-Free Optimized Version
Windows Shellcode Development
Key Differences from Linux
Windows execve Equivalent: WinExec
Manual PEB Walking Approach
Practical Metasploit Approach
Metasploit Workflow
Common msfvenom Payloads
Kernel Driver Exploitation
Why Use Kernel Drivers?
Common Kernel Driver Techniques
Kernel Driver Challenges
Practical Considerations
Creating Vulnerable Software
1. Stack-Based Buffer Overflow
2. Format String Vulnerability
3. Heap Overflow / Use-After-Free
4. Integer Overflow
Advanced Protection Bypasses
Modern Exploitation Challenges
Protection Matrix
Debugging & Analysis Tools
Essential Tools Checklist
GDB Enhanced with GEF/Pwndbg
Practical Debugging Workflow
Common Pitfalls & Solutions
Problem: Shellcode Contains Null Bytes
Problem: Shellcode Crashes
Problem: Address Changes Between Runs (ASLR)
Problem: Antivirus Detection
Problem: Modern Protections
Quick Reference Commands
Essential Compilation Flags
Metasploit Quick Reference
Debugging Commands
Conclusion
Last updated
Was this helpful?