0x1CA3 / execelf
A utility to run ELF files in memory.
☆15Updated 3 years ago
Alternatives and similar repositories for execelf:
Users that are interested in execelf are comparing it to the libraries listed below
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆19Updated last year
- Get/dump chrome and firefox saved passwords.☆19Updated 4 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆52Updated 3 years ago
- Windows Explorer application written in assembly☆14Updated last year
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated last year
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆36Updated 4 years ago
- Debugger checks in 3 ways☆18Updated 6 years ago
- Static library and headers for linking your software with ntdll.dll☆31Updated 5 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- executing JS from x86 code☆27Updated 5 years ago
- A tool / library for simplifying string obfuscation with xor.☆23Updated 6 months ago
- ☆13Updated 10 years ago
- Socks 5 proxy☆10Updated last year
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 3 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Dynamic COFF object loader☆22Updated 6 years ago
- ☆10Updated 4 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- A tiny Windows hook library for x86/x64☆14Updated last year
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- ☆18Updated 5 years ago
- ☆23Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago