aseemjakhar / jugaadLinks
Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.
☆48Updated 14 years ago
Alternatives and similar repositories for jugaad
Users that are interested in jugaad are comparing it to the libraries listed below
Sorting:
- NASM Standard Library for shellcode☆69Updated 9 years ago
- Stealth's 64bit injectso port☆73Updated 15 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- ☆70Updated 3 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- ☆35Updated 13 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- Linux Runtime Process Injection Tool☆61Updated 12 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 11 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆91Updated last year
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆49Updated 4 years ago
- A forked and hardened version of PartitionAlloc from Chrome's Blink engine☆62Updated 7 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 4 months ago
- Statically linked Library detector☆70Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆136Updated 7 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆35Updated 8 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Runtime Process Infection Made Easy☆186Updated last year
- Diary of a reverse-engineer☆39Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago