A utility to run ELF files in memory.
☆16Oct 29, 2021Updated 4 years ago
Alternatives and similar repositories for execelf
Users that are interested in execelf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An ADB-based botnet written in C.☆48May 3, 2022Updated 3 years ago
- A fast, lightweight botnet written in pure C.☆42Nov 10, 2021Updated 4 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Thanatos.☆16Apr 29, 2021Updated 4 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- HTTPS GET RAT and Memory Loader☆26Jun 10, 2025Updated 9 months ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆22Jan 28, 2021Updated 5 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆11Oct 11, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Google Bot Guard Request☆19Dec 13, 2019Updated 6 years ago
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆10Feb 3, 2016Updated 10 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- C# Exe that can remotely retrieve C# assemblies for in-memory execution☆19Feb 22, 2019Updated 7 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 2 months ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Crawling Free HTTP and SOCKS Proxies on Internet☆24Sep 9, 2015Updated 10 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 8 months ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- small, fast memset based on microsoft's design☆13Apr 5, 2022Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- File downloader with SSL support and progress bar☆19Sep 14, 2017Updated 8 years ago