AXDOOMER / run-embedded-elf-from-memoryLinks
Experiment with Linux system calls (memfd_create, fexecve, fork...)
☆24Updated 6 years ago
Alternatives and similar repositories for run-embedded-elf-from-memory
Users that are interested in run-embedded-elf-from-memory are comparing it to the libraries listed below
Sorting:
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆53Updated 9 years ago
- ☆18Updated 7 years ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆28Updated 7 years ago
- ☆49Updated 6 years ago
- May the POC be with you☆63Updated 2 months ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 11 months ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆15Updated 3 years ago
- Full chain Chrome 71.0.3578.98 exploit☆19Updated 4 years ago
- ☆11Updated 3 years ago
- POC For CVE-2022-24483☆14Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 6 years ago
- Collection of slides☆33Updated last month
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- ☆20Updated 5 years ago
- PoC CVE-2021-30632 - Out of bounds write in V8☆74Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆56Updated 4 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- IDA plugin for COM☆48Updated 3 years ago
- IDA (sort of) headless☆26Updated last year
- ACTIVELabs Security Advisories☆23Updated 4 years ago
- crash poc & Leak info PoC☆18Updated 7 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆35Updated 2 years ago
- prebuild angr wheels for Windows on x86_64☆15Updated 7 years ago
- ☆12Updated 4 years ago
- Bootkits☆18Updated 2 years ago
- ☆26Updated 6 years ago
- Changing memory protection in an arbitrary process☆47Updated 6 years ago
- Enumerate URL schemes on macOS and Windows☆45Updated last year
- ☆26Updated 7 years ago