SoldierX / libhijackLinks
Runtime Process Infection Made Easy
☆187Updated last year
Alternatives and similar repositories for libhijack
Users that are interested in libhijack are comparing it to the libraries listed below
Sorting:
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆79Updated 5 years ago
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆121Updated 5 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- setroubleshootd xSports☆93Updated 8 years ago
- Stealth's 64bit injectso port☆73Updated 15 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆232Updated 3 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 10 years ago
- ☆137Updated 7 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Updated 7 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 12 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- This is the new ftrace (https://github.com/elfmaster/ftrace) - Much faster, better resolution but not complete yet! :)☆109Updated 6 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆154Updated 6 years ago
- ☆137Updated 4 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Updated 7 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Updated 9 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago