MatheuZSecurity / ElfDoor-gccLinks
ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.
☆132Updated 8 months ago
Alternatives and similar repositories for ElfDoor-gcc
Users that are interested in ElfDoor-gcc are comparing it to the libraries listed below
Sorting:
- Attacking the cleanup_module function of a kernel module☆54Updated 6 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- ☆108Updated last year
- ☆146Updated last year
- Collection of codes focused on Linux rootkits☆190Updated 2 months ago
- Windows rootkit designed to work with BYOVD exploits☆211Updated 11 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 10 months ago
- ☆61Updated 8 months ago
- Windows AppLocker Driver (appid.sys) LPE☆71Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 10 months ago
- "Service-less" driver loading☆167Updated last year
- Payload encoding utility to effectively lower payload entropy.☆122Updated 8 months ago
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 5 months ago
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 6 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- Create Anti-Copy DRM Malware☆70Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆133Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- Monarch - The Adversary Emulation Toolkit☆63Updated 11 months ago
- Windows Persistence IT-Security☆108Updated 9 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- A collection of PoCs to do common things in unconventional ways☆122Updated 4 months ago