aseemjakhar / jugaadLinks
Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.
☆49Updated 14 years ago
Alternatives and similar repositories for jugaad
Users that are interested in jugaad are comparing it to the libraries listed below
Sorting:
- NASM Standard Library for shellcode☆69Updated 9 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 9 months ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Stealth's 64bit injectso port☆73Updated 15 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Implementation of the SMM rootkit "The Watcher"☆131Updated 3 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Updated 11 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- ☆35Updated 13 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- ☆38Updated 10 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 7 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Updated 3 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- System tracer implementation in Rust☆32Updated 9 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 8 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- BitErrant☆59Updated 8 years ago
- Linux Runtime Process Injection Tool☆61Updated 12 years ago
- REIL translation library☆36Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆97Updated 9 years ago
- ☆71Updated 4 years ago