Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.
☆49Jul 10, 2011Updated 14 years ago
Alternatives and similar repositories for jugaad
Users that are interested in jugaad are comparing it to the libraries listed below
Sorting:
- Linux Runtime Process Injection Tool☆61Feb 21, 2013Updated 13 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Tools and library to manipulate EFI variables.☆10Mar 2, 2026Updated last week
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- REST-like framework and server for blazing fast web applications in C++11.☆16Oct 23, 2016Updated 9 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- a fork of a very cool, but dormant, project at http://www.eresi-project.org/☆21Sep 13, 2012Updated 13 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- ld-linux code injector☆50Oct 28, 2011Updated 14 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆43Mar 18, 2015Updated 10 years ago
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- Operating systems playground.☆16Sep 3, 2019Updated 6 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- Security attack and protection☆22Nov 2, 2017Updated 8 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Python concolic execution framework for program analysis☆68Nov 13, 2014Updated 11 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Apr 1, 2023Updated 2 years ago
- asrepl: x86-64 assembly REPL☆71Apr 13, 2017Updated 8 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- Extract DEX files from an ART ELF binary☆41Mar 12, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Leaked Mirai Source Code - make it vagrantized☆29Jun 8, 2021Updated 4 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Aug 22, 2018Updated 7 years ago
- Writeups for my reverse engineering shanenagins☆44Jan 23, 2019Updated 7 years ago
- SHA-3 finalist (reference code)☆41May 2, 2014Updated 11 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- Linux Rootkit Scanner☆88Jan 24, 2022Updated 4 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago