captain-woof / elf-in-memory-execLinks
Python3 scripts that executes an elf (Linux executable format) completely in memory.
☆26Updated 2 years ago
Alternatives and similar repositories for elf-in-memory-exec
Users that are interested in elf-in-memory-exec are comparing it to the libraries listed below
Sorting:
- Userland exec PoC to be used as attack vector technique☆85Updated 5 months ago
- Monarch - The Adversary Emulation Toolkit☆61Updated 6 months ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆71Updated 6 months ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Updated 7 months ago
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- Asynchronous NFSv3 client in pure Python☆26Updated last week
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆191Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆26Updated 2 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆136Updated 2 years ago
- HTML Smuggling with Web Assembly☆63Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Keep it secret, keep it safe☆76Updated 5 months ago
- ☆19Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆14Updated last year
- A tunneling toolkit enabling operators to move data from one place to another evasively.☆63Updated last month
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆15Updated 10 months ago
- dlopen() filelessly a shared object or even a program (and run it).☆55Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated 3 months ago
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆35Updated 2 months ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago