Loading...

Looking for alternatives to Charlotte? Charlotte is an undetected C++ shellcode launcher for executing shellcode with stealth. Browse 32 similar Security Operations tools below, compare features side-by-side, and find the best fit for your security stack.
Private training course for IoT device pentesting and exploitation
Whole-system emulation environment for software dev, debugging, testing & security
AI agent for in-depth binary analysis and reverse engineering assistance.
A Python script that converts shellcode into a PE32 or PE32+ file.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.
Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.
An open-source shellcode and PE packer for creating and managing portable executable files.
PinCTF is a Python wrapper tool that uses Intel's Pin framework to instrument binaries and count instructions for reverse engineering analysis.
Assembler/disassembler for the dex format used by Dalvik, Android's Java VM implementation.
PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
A Java bytecode assembler and disassembler toolkit that converts classfiles to human-readable format and provides decompilation capabilities for reverse engineering Java applications.
angr is a Python-based binary analysis framework that provides disassembly, symbolic execution, and program analysis capabilities for cross-platform binary examination.
A Linux process injection tool that uses ptrace() to inject assembly-based shellcode into running processes without NULL byte restrictions.
Fernflower is an analytical decompiler for Java with command-line options and support for external classes.
Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
A backend agnostic debugger frontend for debugging binaries without source code access.
ILSpy is the open-source .NET assembly browser and decompiler with various decompiler frontends and features.
JD-GUI is a graphical Java decompiler that reconstructs and displays source code from compiled ".class" files for reverse engineering and code analysis purposes.
A payload creation framework for generating and executing C# code payloads with anti-evasion capabilities for offensive security operations.
SigThief extracts digital signatures from signed PE files and appends them to other files to create invalid signatures for testing Anti-Virus detection mechanisms.
steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.
A collection of setup scripts for various security research tools with installers for tools like afl, angr, barf, and more.
A VMware image for penetration testing purposes
UPX is a high-performance executable packer for various executable formats.
Online Java decompiler tool with support for modern Java features.
Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.
A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.
Get strategic cybersecurity insights in your inbox