Frodox / execute-machine-code-from-memoryLinks
Proof of concept example: executing machine code from different memory areas: stack, heap, shared memory
☆43Updated 9 years ago
Alternatives and similar repositories for execute-machine-code-from-memory
Users that are interested in execute-machine-code-from-memory are comparing it to the libraries listed below
Sorting:
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆32Updated 7 years ago
- An implementation of the Salsa20 stream cipher in C99☆117Updated 9 years ago
- C/C++ machine code obfuscation.☆65Updated 4 years ago
- X86/X64/ARM/MIPS Assembler/Disassembler/Decomposer Library☆37Updated 5 years ago
- An ELF loader capable of manually loading ELF executables directly from memory into a new process, without the use of exec.☆53Updated 5 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- dlopen from memory☆215Updated 10 years ago
- Obfuscates dynamic symbol table☆135Updated 6 years ago
- Native win32 executables loader☆55Updated 7 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Updated 5 years ago
- Simple ELF crypter. Uses RC4 encryption.☆122Updated 5 years ago
- AMD64 PE Emulator in Python.☆85Updated last year
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- RetDec plugin for Radare2☆127Updated 2 years ago
- Tiny loaders for various binary formats.☆241Updated 9 years ago
- ELF packer - x86_64☆73Updated 10 years ago
- ☆38Updated 3 years ago
- Binary formats☆29Updated this week
- ELF DSO injector☆68Updated 3 months ago
- Automatically exported from code.google.com/p/corkami☆57Updated 4 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- A Linux based Windows compatible user mode kernel☆59Updated 16 years ago
- Tiny ELF loader☆134Updated 2 years ago
- executing JS from x86 code☆27Updated 6 years ago
- An example sandbox using AppContainer (Windows 8+)☆140Updated 5 years ago
- Small tool to run ELF binaries from memory with a given process name☆169Updated 4 years ago
- Portable Reverse Engineering Framework☆143Updated 8 years ago
- Keystone assembler framework for JavaScript☆78Updated 2 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆58Updated 7 years ago
- userland exec for Linux x86_64☆67Updated 3 years ago