XiphosResearch / netelfLinks
Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
☆283Updated 7 years ago
Alternatives and similar repositories for netelf
Users that are interested in netelf are comparing it to the libraries listed below
Sorting:
- Hide processes as a normal user in Linux.☆258Updated last year
- Linux v4.x.x Rootkit☆93Updated last year
- A simple MBR hijack demonstration☆181Updated 2 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 5 years ago
- Search for code cave in all binaries☆285Updated last year
- A keystroke / terminal logger for Linux.☆216Updated last year
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated 2 years ago
- Stealthy backdoor for Windows operating systems☆284Updated 5 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆133Updated 4 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- A General Purpose DLL & Code Injection Utility☆156Updated 7 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆199Updated 4 months ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆365Updated 10 years ago
- Small tool to run ELF binaries from memory with a given process name☆168Updated 3 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆136Updated 7 years ago
- Runtime Process Infection Made Easy☆186Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆152Updated 2 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 10 months ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117Updated 6 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- A C/C++ implementation of Microsoft's Antimalware Scan Interface☆182Updated 7 years ago
- DLL Injection tool to unlock guest VMs☆239Updated 12 years ago
- HORSEPILL rootkit PoC☆228Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Packet capture on Windows without a kernel driver☆189Updated 6 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆177Updated 12 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago