An ELF parser written fully in NASM.
☆12Oct 20, 2025Updated 5 months ago
Alternatives and similar repositories for parsELF
Users that are interested in parsELF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A reverse/bind shell generator utility☆11Jul 22, 2024Updated last year
- ☆19Mar 22, 2025Updated last year
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- This is the leaked source code of Windows Server 2003☆28Sep 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Dec 2, 2021Updated 4 years ago
- Feitian Rockey4ND dongle testing☆34Oct 26, 2022Updated 3 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- puriFIR - Minimum Phase Impulse Response Converter (porting to Max from Kallyn original python script for FL Studio)☆12Updated this week
- Send SECURE_ERASE_UNIT and SANITIZE_DEVICE ATA command to hard disks☆50Mar 23, 2014Updated 12 years ago
- ☆18Feb 23, 2026Updated last month
- UIE(Universal Information Extraction) infer by ncnn☆15Sep 22, 2024Updated last year
- spoof page-table-entry nx bit☆10Feb 16, 2022Updated 4 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Sep 10, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- A simple anti-rootkit Linux kernel module for an 'Operating Systems Security' course.☆16May 21, 2021Updated 4 years ago
- An Enhanced WHOIS Server List of Top Level TLDs. Automatic updates.☆21Feb 15, 2026Updated last month
- A kernel rootkit that works without kallsyms and kprobe support.☆29Aug 18, 2025Updated 7 months ago
- Lambda Calculus compiler targeting x86, written in Racket☆11Jun 14, 2020Updated 5 years ago
- Simple Protected Mode Kernel for i386☆15Dec 30, 2019Updated 6 years ago
- ☆17Sep 25, 2024Updated last year
- 🥷 Soothing pastel theme for Binary Ninja☆26Apr 22, 2025Updated 11 months ago
- Use GDI in KernelMode☆26Oct 1, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Mar 10, 2025Updated last year
- yet another hidden LKM hunter☆32Sep 18, 2025Updated 6 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆112Mar 25, 2024Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆87Jul 24, 2017Updated 8 years ago
- An easy way to swap and manage Payday 2 mods outside the game☆13Jul 10, 2025Updated 8 months ago
- my learning case about windows☆21Feb 4, 2022Updated 4 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- A collection of Genshin Impact's in-game books available in EPUB format.☆18Jan 30, 2026Updated last month
- A C++ code and Python scripts used to simulate the self-assembly of nanoparticles that have been directionally functionalized by DNA.☆18Jul 1, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆20May 17, 2022Updated 3 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆35Jul 10, 2024Updated last year
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Kubit React Components is a customizable, accessible library of React web components, designed to enhance your application's user experie…☆32Updated this week
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated 2 years ago
- Hacker Disassembler Engine - mirro☆26Jul 13, 2022Updated 3 years ago
- compiler for ez (a language that I made)☆17Oct 8, 2023Updated 2 years ago