Frodox / execute-machine-code-from-memoryLinks
Proof of concept example: executing machine code from different memory areas: stack, heap, shared memory
☆43Updated 9 years ago
Alternatives and similar repositories for execute-machine-code-from-memory
Users that are interested in execute-machine-code-from-memory are comparing it to the libraries listed below
Sorting:
- An ELF loader capable of manually loading ELF executables directly from memory into a new process, without the use of exec.☆55Updated 6 years ago
- X86/X64/ARM/MIPS Assembler/Disassembler/Decomposer Library☆38Updated 6 years ago
- executing JS from x86 code☆27Updated 6 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆59Updated 7 years ago
- userland exec for Linux x86_64☆67Updated 3 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- Virtualization detection through speculative execution PoCs and papers☆69Updated 7 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Updated 5 years ago
- Tiny loaders for various binary formats.☆245Updated 9 years ago
- ☆40Updated 3 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆158Updated 3 years ago
- Simple ELF crypter. Uses RC4 encryption.☆127Updated 5 years ago
- Native win32 executables loader☆57Updated 7 years ago
- ELF packer - x86_64☆74Updated 10 years ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- Obfuscates dynamic symbol table☆135Updated 7 years ago
- CreateRemoteThread for Linux☆40Updated 6 years ago
- An implementation of the Salsa20 stream cipher in C99☆117Updated 9 years ago
- An example of how to parse an ELF symbol table.☆15Updated 9 years ago
- PE file manipulation library.☆63Updated 6 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Updated 4 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆33Updated 7 years ago
- AMD64 PE Emulator in Python.☆85Updated 2 years ago
- Minimal RarVM Toolchain☆236Updated 10 years ago
- System call interceptor for windows☆40Updated 3 years ago
- ARM is Turing-complete without data fetches☆58Updated 7 years ago
- A Linux based Windows compatible user mode kernel☆59Updated 16 years ago
- Automatically exported from code.google.com/p/corkami☆59Updated 5 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆74Updated 6 years ago
- gelfload is Gregor's ELF loader. It is a usermode loader for ELF executables, used for two purposes: 1) Creating ELF environments on othe…☆38Updated 11 years ago