A web-based shellcode assembly workbench for security researchers and exploit developers. You write (or paste) x86 or x64 assembly instructions, and the tool assembles them on the fly using the Keystone engine in a Python backend — giving you raw shellcode bytes with instant feedback.
It goes beyond a simple assembler: every output byte is automatically scanned against a configurable bad character list, with offending bytes highlighted in red so you can spot problems before your shellcode hits a target process.
0x00, add more as needed)bytes([...])) with inline /*BAD*/ markers for non-ANSI terminalsExploit developers and security researchers doing Windows/Linux userland exploitation, CTF players writing custom shellcode stages, and anyone who regularly needs to iterate on shellcode and check for bad bytes without running the full exploit each time.
Database.py — extensible dictionary of named shellcode templates