binophism / processinjection-via-syscallLinks
☆16Updated 9 months ago
Alternatives and similar repositories for processinjection-via-syscall
Users that are interested in processinjection-via-syscall are comparing it to the libraries listed below
Sorting:
- Framework for generating audit commands for Unix security audits☆66Updated 2 years ago
- SBLoader is a memory patcher to patch and execute the child process under the desired parent process.☆14Updated 3 years ago
- Obfuscate UDP traffic as RTP☆19Updated 2 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆27Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- ☆32Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆83Updated 3 weeks ago
- Exploiting: CVE-2021-41349☆11Updated 3 years ago
- ☆16Updated 5 years ago
- Tools for offensive security of NetBackup infrastructures☆40Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆17Updated last year
- ☆48Updated last year
- Presentaciones de congresos☆53Updated last year
- IAT Unhooking proof-of-concept☆30Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆47Updated 5 years ago
- ☆29Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- This is a collection of Worms for educational purposes☆32Updated 2 months ago
- code obfuscation via control flow flattening☆13Updated 7 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆46Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Jar2Exe extraction tool☆15Updated 2 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆45Updated last month
- TightVNC Vulnerability.☆16Updated 3 years ago
- ☆33Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- ☆17Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆57Updated 7 months ago
- yet another hidden LKM hunter☆26Updated 3 weeks ago