Runtime Process Infection Made Easy
☆188Mar 9, 2024Updated 2 years ago
Alternatives and similar repositories for libhijack
Users that are interested in libhijack are comparing it to the libraries listed below
Sorting:
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 4 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆46Jul 2, 2016Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Jun 22, 2020Updated 5 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 6 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Jun 2, 2019Updated 6 years ago
- another socks5 server , support linux, BSD , use epoll and kqueue technology☆13Jan 16, 2018Updated 8 years ago
- Pintool to detect Read before Write memory access☆21Mar 20, 2013Updated 12 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- PE Infector/Cryptor source code☆20Jul 23, 2022Updated 3 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- ☆33Mar 4, 2022Updated 4 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- ☆50Dec 28, 2012Updated 13 years ago
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- Static DLL Patching and Hooking System☆25Sep 30, 2015Updated 10 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago