binophism / processinjection-via-syscallLinks
☆16Updated 8 months ago
Alternatives and similar repositories for processinjection-via-syscall
Users that are interested in processinjection-via-syscall are comparing it to the libraries listed below
Sorting:
- Framework for generating audit commands for Unix security audits☆66Updated 2 years ago
- SBLoader is a memory patcher to patch and execute the child process under the desired parent process.☆14Updated 3 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 11 months ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆52Updated this week
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆26Updated 11 months ago
- ☆17Updated 2 years ago
- ☆29Updated last year
- This repository is related to specialized books published by the THB team.☆17Updated 2 weeks ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Obfuscate UDP traffic as RTP☆20Updated last year
- Presentaciones de congresos☆53Updated last year
- This is a collection of Worms for educational purposes☆31Updated last month
- ☆29Updated last year
- ☆48Updated last year
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆45Updated 2 weeks ago
- OSED Practice binary☆24Updated last year
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Updated 4 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Golang bindings for PE-sieve☆42Updated last year
- my write-ups for flareon7☆27Updated 4 years ago
- IAT Unhooking proof-of-concept☆30Updated last year
- ☆37Updated 8 months ago
- yet another hidden LKM hunter☆25Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 5 months ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- ☆46Updated 2 months ago
- Recon 2023 slides and code☆79Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago