BishopFox / asminjectLinks
Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86-64, x86, and ARM32 Linux processes without the use of ptrace by accessing /proc/<pid>/mem. Useful for certain post-exploitation scenarios, recovering content from process memory, etc..
☆137Updated 2 years ago
Alternatives and similar repositories for asminject
Users that are interested in asminject are comparing it to the libraries listed below
Sorting:
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆191Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆116Updated 8 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- LD_PRELOAD rootkit☆134Updated last year
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- eBPF hacks☆188Updated 7 months ago
- ☆47Updated 2 years ago
- ☆204Updated 9 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆168Updated last year
- Mara is a userland pty/tty sniffer☆53Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆117Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆167Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- ☆134Updated last year
- ☆80Updated last year
- Linux process injection PoCs☆29Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆67Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆128Updated last month
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 4 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago
- CVE-2018-6066 using VBA☆66Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year