0x1CA3 / execelf
A utility to run ELF files in memory.
☆15Updated 3 years ago
Alternatives and similar repositories for execelf:
Users that are interested in execelf are comparing it to the libraries listed below
- ELF packer/crypter that aims to create hardened and stealthy troyans☆53Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆19Updated last year
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 2 months ago
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- Windows Explorer application written in assembly☆14Updated last year
- Dynamic COFF object loader☆22Updated 6 years ago
- Infects PE files with a shellcode☆16Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Library to support cross-platform AES encryption☆11Updated 4 months ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- Silent Monero (XMR) CPU miner☆23Updated 6 years ago
- x64dbg scripts for finding OEP of packers☆14Updated 6 years ago
- executing JS from x86 code☆27Updated 5 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- ☆10Updated 4 years ago
- Dump mapped PE files from memory to the disk☆19Updated 5 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 4 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆45Updated 2 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- ☆18Updated 5 years ago
- Virtual Machine for x64 and x86 systems☆34Updated 3 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago