XiphosResearch / netelfLinks
Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
☆283Updated 7 years ago
Alternatives and similar repositories for netelf
Users that are interested in netelf are comparing it to the libraries listed below
Sorting:
- Hide processes as a normal user in Linux.☆258Updated last year
- Stealthy backdoor for Windows operating systems☆281Updated 5 years ago
- A simple MBR hijack demonstration☆181Updated 2 years ago
- A keystroke / terminal logger for Linux.☆217Updated last year
- Cminer is a tool for enumerating the code caves in PE files.☆152Updated 2 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- Small tool to run ELF binaries from memory with a given process name☆167Updated 3 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- Linux v4.x.x Rootkit☆91Updated 11 months ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆364Updated 10 years ago
- A General Purpose DLL & Code Injection Utility☆154Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆135Updated 7 years ago
- DLL Injection tool to unlock guest VMs☆237Updated 12 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆131Updated 4 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆185Updated 8 years ago
- Packet capture on Windows without a kernel driver☆187Updated 6 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Search for code cave in all binaries☆282Updated last year
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆71Updated 5 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆122Updated 8 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆184Updated 6 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Teaching old shellcode new tricks☆205Updated 7 years ago