aseemjakhar / jugaadView external linksLinks
Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.
☆49Jul 10, 2011Updated 14 years ago
Alternatives and similar repositories for jugaad
Users that are interested in jugaad are comparing it to the libraries listed below
Sorting:
- Linux Runtime Process Injection Tool☆61Feb 21, 2013Updated 12 years ago
- Stealth's 64bit injectso port☆73Jul 31, 2010Updated 15 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- An open source modding framework for Bloons TD Battles 2☆13Jun 16, 2022Updated 3 years ago
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated 3 weeks ago
- The frontend for Cumulonimbus☆12Jan 31, 2026Updated 2 weeks ago
- 💣 Destroy those emojis from your strings!☆10Apr 27, 2022Updated 3 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- 🐱 // Catfetch is a small and cute fetch program written in Go☆14May 5, 2022Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- ld-linux code injector☆50Oct 28, 2011Updated 14 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- put things over there from over here☆15Dec 19, 2023Updated 2 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- A programming language that compiles to a TI-Basic program☆16Dec 13, 2021Updated 4 years ago
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- Operating systems playground.☆16Sep 3, 2019Updated 6 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- An experimental, rootless, Alpine-based container runtime☆22Dec 28, 2022Updated 3 years ago
- Security attack and protection☆22Nov 2, 2017Updated 8 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- A blazingly fast and secure Pastebin alternative☆29Sep 11, 2023Updated 2 years ago
- 🦦 An Embeddable SQL Executor in Rust☆27Feb 27, 2024Updated last year
- ☆26Updated this week
- asrepl: x86-64 assembly REPL☆71Apr 13, 2017Updated 8 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Modular Python-based Twitch chat bot optimized for customizability and ease of use.☆12Feb 22, 2025Updated 11 months ago
- A simple Docker Swarm tutorial - For users that got burned by Kubernetes for the nth time and just want to use something easy & simple☆29Aug 25, 2022Updated 3 years ago
- A script that gets the news from liveuamap.com to post is on Discord as a webhook☆24Mar 31, 2022Updated 3 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- Extract DEX files from an ART ELF binary☆41Mar 12, 2016Updated 9 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 5 years ago
- Writeups for my reverse engineering shanenagins☆44Jan 23, 2019Updated 7 years ago