Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster
☆32Feb 23, 2020Updated 6 years ago
Alternatives and similar repositories for Erebus
Users that are interested in Erebus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- sample linux x86_64 ELF virus☆54Jun 25, 2018Updated 7 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Feb 24, 2022Updated 4 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Apr 8, 2020Updated 5 years ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Jun 25, 2018Updated 7 years ago
- ☆16May 15, 2021Updated 4 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Sep 10, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- Obfuscates dynamic symbol table☆136Jan 10, 2019Updated 7 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Shiva is a programmable dynamic linker for loading ELF microprograms☆35Sep 4, 2023Updated 2 years ago
- My RE challenge from Northsec 2018.☆14Jun 1, 2022Updated 3 years ago
- Virtual machine with a custom instruction set in C☆16Jul 17, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- sploit☆67Dec 21, 2019Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Clonewise - Detecting Package Clones and Inferring Security Vulnerabilities on Entire Linux Distributions.☆25Feb 15, 2013Updated 13 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆452Jan 26, 2026Updated 2 months ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Jun 25, 2019Updated 6 years ago
- Runtime Process Infection Made Easy☆188Mar 9, 2024Updated 2 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- ☆30Jan 28, 2021Updated 5 years ago
- ☆12Mar 1, 2021Updated 5 years ago
- Talpa Kernel file access interception modules☆17Oct 12, 2022Updated 3 years ago