AXDOOMER / run-embedded-elf-from-memoryLinks
Experiment with Linux system calls (memfd_create, fexecve, fork...)
☆22Updated 6 years ago
Alternatives and similar repositories for run-embedded-elf-from-memory
Users that are interested in run-embedded-elf-from-memory are comparing it to the libraries listed below
Sorting:
- a C/C++ shellcode compiler based on llvm/clang☆36Updated 9 years ago
- ☆22Updated 6 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- ☆18Updated 7 years ago
- ☆33Updated 3 years ago
- The kernel debugger script for checking kernel level rootkits.☆12Updated 5 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- ☆11Updated 3 years ago
- ☆24Updated 7 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated 8 months ago
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆53Updated 9 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆31Updated 4 years ago
- Using GNU lightning to generate xor deobfuscation at runtime☆26Updated 7 years ago
- ☆33Updated 9 years ago
- IDA (sort of) headless☆24Updated last year
- Tools released in CSS 2019☆38Updated 5 years ago
- Shellcode Spider of Exploit-DB☆11Updated 7 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- ☆33Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 7 months ago
- Tool for working with memory of a running Linux process☆12Updated 4 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Dynamic COFF object loader☆23Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Updated 8 years ago
- Inject libraries into 32 processes on macOS Mojave☆15Updated 5 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago