captain-woof / elf-in-memory-execLinks
Python3 scripts that executes an elf (Linux executable format) completely in memory.
☆26Updated 2 years ago
Alternatives and similar repositories for elf-in-memory-exec
Users that are interested in elf-in-memory-exec are comparing it to the libraries listed below
Sorting:
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆71Updated 5 months ago
- TypeScript/JavaScript client libraries for Sliver☆20Updated 2 years ago
- Socks5 / Socks4 client and server library☆70Updated 2 months ago
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆14Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆96Updated 3 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆19Updated 5 months ago
- all credits go to @mgeeky☆64Updated 3 years ago
- ShellcodeFluctuation PoC ported to Nim☆77Updated 2 years ago
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆30Updated 2 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆127Updated 2 years ago
- Select any exported function in a dll as the new dll's entry point.☆79Updated 7 months ago
- A tunneling toolkit enabling operators to move data from one place to another evasively.☆60Updated 2 weeks ago
- Simple HTTP async comms using standard GET/POST requests☆35Updated 2 months ago
- ☆69Updated last year
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆14Updated 9 months ago
- Go library to allow native inline hooking in windows at runtime☆14Updated last year
- Nim version of MDSec's Parallel Syscall PoC☆125Updated 3 years ago
- Monarch - The Adversary Emulation Toolkit☆62Updated 5 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆29Updated 4 months ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 3 weeks ago
- A simple C# program to unhook AMSI and execute unmanaged PowerShell.☆19Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆51Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆25Updated 2 years ago
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago