Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
☆284Sep 28, 2017Updated 8 years ago
Alternatives and similar repositories for netelf
Users that are interested in netelf are comparing it to the libraries listed below
Sorting:
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆118Aug 22, 2016Updated 9 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- Find exploitable PHP files by parameter fuzzing and function call tracing☆72Jan 24, 2017Updated 9 years ago
- Sustainable shellcode evasion☆113Updated this week
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ☆16May 15, 2021Updated 4 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- A tool to elevate privilege with Windows Tokens☆1,063Oct 6, 2023Updated 2 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Nov 9, 2019Updated 6 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- A PoC package for hosting the CLR and executing .NET from Go☆229Nov 10, 2022Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 10 months ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Aug 10, 2019Updated 6 years ago
- Universal Unhooking☆326Sep 19, 2018Updated 7 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆215May 5, 2022Updated 3 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Load shellcode into a new process☆768Jun 2, 2021Updated 4 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- SMS Phishing Tools☆79Jul 19, 2017Updated 8 years ago
- Tiny loaders for various binary formats.☆246May 4, 2016Updated 9 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆843Jun 25, 2024Updated last year
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆761Jan 28, 2019Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆704Feb 24, 2024Updated 2 years ago
- ☆110May 14, 2018Updated 7 years ago