0x1CA3 / execelf
A utility to run ELF files in memory.
☆15Updated 3 years ago
Alternatives and similar repositories for execelf:
Users that are interested in execelf are comparing it to the libraries listed below
- ELF packer/crypter that aims to create hardened and stealthy troyans☆53Updated 3 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Get/dump chrome and firefox saved passwords.☆19Updated 4 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆21Updated last year
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- WIP python3 plugin for x64dbg☆14Updated 3 years ago
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆37Updated 4 years ago
- x86_64, PE32+, FAT32 bootloader☆25Updated 3 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆35Updated 6 years ago
- Binary formats☆27Updated this week
- PE Library x86☆21Updated 5 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- executing JS from x86 code☆27Updated 5 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆46Updated 2 years ago
- ☆18Updated 5 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 4 months ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- Dynamic COFF object loader☆23Updated 6 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆22Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Reverse Windows shell over TLS☆18Updated 9 years ago