binophism / processinjection-via-syscallLinks
☆16Updated last year
Alternatives and similar repositories for processinjection-via-syscall
Users that are interested in processinjection-via-syscall are comparing it to the libraries listed below
Sorting:
- Framework for generating audit commands for Unix security audits☆66Updated 2 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Updated last year
- SBLoader is a memory patcher to patch and execute the child process under the desired parent process.☆14Updated 3 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 3 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- Presentaciones de congresos☆55Updated last year
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- ☆27Updated 2 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆48Updated last week
- ☆35Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- ☆26Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Updated 2 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- ☆17Updated 9 months ago
- This repository is related to specialized books published by the THB team.☆20Updated 5 months ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Updated 4 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- ☆25Updated 3 years ago
- ☆17Updated 2 years ago
- BINARLY Research Tools and PoCs☆39Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- Modified version of PEAS client for offensive operations☆50Updated 3 months ago
- ☆33Updated 3 years ago
- This is a collection of Worms for educational purposes☆34Updated 6 months ago
- ☆49Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 11 months ago