c-skills / vala-vala-heyLinks
Manjaro LPE
☆34Updated 2 years ago
Alternatives and similar repositories for vala-vala-hey
Users that are interested in vala-vala-hey are comparing it to the libraries listed below
Sorting:
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆125Updated 3 months ago
- A way to use fonts to obfuscate text.☆47Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- WallEscape vulnerability in util-linux☆52Updated last year
- Signing-key abuse and update exploitation framework☆130Updated 4 months ago
- ☆82Updated 2 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆170Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- ☆49Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 4 months ago
- ☆134Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆20Updated 9 months ago
- Mara is a userland pty/tty sniffer☆54Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆194Updated last year
- iTLB multihit PoC☆42Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 7 months ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- A simple Meterpreter stager written in Rust.☆40Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆28Updated last year
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆86Updated this week
- Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.☆64Updated this week
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆26Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆118Updated 10 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- KeyTrap (DNSSEC)☆42Updated last year