SoldierX / libhijack
Runtime Process Infection Made Easy
☆182Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for libhijack
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆128Updated 6 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆70Updated 8 years ago
- HORSEPILL rootkit PoC☆223Updated 8 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆128Updated 3 years ago
- setroubleshootd xSports☆92Updated 7 years ago
- ☆138Updated 6 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆76Updated 4 years ago
- Small tool for disassembling shellcode (using objdump)☆146Updated 2 years ago
- An open source, multi-architecture ROP compiler written in python☆160Updated 7 years ago
- This is the new ftrace (https://github.com/elfmaster/ftrace) - Much faster, better resolution but not complete yet! :)☆106Updated 6 years ago
- capstone based disassembler for extracting to binnavi☆226Updated 8 years ago
- Cross Architecture Shellcode in C☆198Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆143Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Synesthesia, implemented as Yices scripts☆89Updated 7 years ago
- ld-linux code injector☆49Updated 13 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆159Updated 7 years ago
- Implementation of the SMM rootkit "The Watcher"☆123Updated 2 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆156Updated 8 years ago
- ☆137Updated 3 years ago