XiphosResearch / netelfLinks
Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
☆282Updated 8 years ago
Alternatives and similar repositories for netelf
Users that are interested in netelf are comparing it to the libraries listed below
Sorting:
- Hide processes as a normal user in Linux.☆258Updated last year
- A simple MBR hijack demonstration☆179Updated 2 years ago
- A keystroke / terminal logger for Linux.☆215Updated last year
- A General Purpose DLL & Code Injection Utility☆156Updated 7 years ago
- Stealthy backdoor for Windows operating systems☆284Updated 5 years ago
- Search for code cave in all binaries☆285Updated last year
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 5 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆365Updated 10 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- DLL Injection tool to unlock guest VMs☆239Updated 12 years ago
- Small tool to run ELF binaries from memory with a given process name☆169Updated 4 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆72Updated 5 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆153Updated 2 years ago
- libpcap based ICMP encrypted backdoor for linux.☆133Updated 4 years ago
- Linux v4.x.x Rootkit☆93Updated last year
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117Updated 6 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆123Updated 11 months ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆326Updated 8 years ago
- EvilVM compiler for information security research tools.☆203Updated 3 years ago
- A way to backdoor every process☆67Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- simple shellcode generator☆114Updated 8 years ago
- A C/C++ implementation of Microsoft's Antimalware Scan Interface☆182Updated 7 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Packet capture on Windows without a kernel driver☆189Updated 7 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago