Load a statically-linked ELF binary(x86 architecture) without the execve syscall.
☆45Sep 20, 2020Updated 5 years ago
Alternatives and similar repositories for runtime-unpack
Users that are interested in runtime-unpack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 内存加载执行golang elf二进制文件☆29Dec 22, 2021Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Apr 29, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Same code , different CPU case , different build case , Iot bins reverse learning.☆28Mar 8, 2017Updated 9 years ago
- Lightdash文件读取漏洞(CVE-2023-35844)☆20Jun 26, 2023Updated 2 years ago
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- Load ELF binaries from a memory buffer.☆49Apr 28, 2026Updated last week
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- List of possible Linux backdoors☆15Aug 7, 2020Updated 5 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21Updated this week
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- MeowTools - maybe some useful tools for CTFers / programmers☆20Nov 27, 2022Updated 3 years ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 10 months ago
- Learning notes of amazing Sliver C2 project.☆25Apr 14, 2023Updated 3 years ago
- ☆12Jan 10, 2024Updated 2 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 10 months ago
- YongYou U8C deserialization file upload exploit tool targeting IPFxxFileService and IFileTrans services☆29Sep 28, 2025Updated 7 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated last year
- How to compile a kernel module with/for another kernel☆12Jan 30, 2020Updated 6 years ago
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- ☆13Jul 29, 2022Updated 3 years ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆284Feb 8, 2024Updated 2 years ago
- CNVD-2021-49104——泛微E-Office文件上传漏洞☆22Dec 1, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- go实现的各种字符串匹配算法☆18Jun 21, 2017Updated 8 years ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- Code that allows running another windows PE in the same address space as the host process.☆10Nov 19, 2019Updated 6 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- A simple PHP extension for hooking eval()☆17Feb 23, 2017Updated 9 years ago
- The E.L.F Executable Loader loads the executable file into memory page-by-page, using a request-paging mechanism - a page will only be lo…☆18Jul 7, 2021Updated 4 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Jun 18, 2023Updated 2 years ago