SoldierX / libhijackLinks
Runtime Process Infection Made Easy
☆187Updated last year
Alternatives and similar repositories for libhijack
Users that are interested in libhijack are comparing it to the libraries listed below
Sorting:
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆80Updated 6 years ago
- Stealth's 64bit injectso port☆73Updated 15 years ago
- Implementation of the SMM rootkit "The Watcher"☆130Updated 3 years ago
- setroubleshootd xSports☆93Updated 8 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 11 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- Toolkit to detect/crash/attack GNU debugging-related tools☆153Updated 9 years ago
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆269Updated 9 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- ☆137Updated 4 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆157Updated 6 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆122Updated 5 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Updated 9 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Updated 9 years ago
- ☆137Updated 7 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Updated 4 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆124Updated 12 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆406Updated 11 years ago