carloslack / volundrLinks
Just another elf parser
☆25Updated last year
Alternatives and similar repositories for volundr
Users that are interested in volundr are comparing it to the libraries listed below
Sorting:
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆27Updated 5 years ago
- Attacking the cleanup_module function of a kernel module☆36Updated 2 months ago
- Load and execute a common object file format (COFF) in the current process☆29Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- Unpacker for donut shellcode☆17Updated 4 years ago
- yet another hidden LKM hunter☆23Updated last year
- Load a dynamic library from memory using a fuse mount☆31Updated last year
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- ☆37Updated 2 years ago
- An In-memory Embedding of CPython☆28Updated 4 years ago
- Loads a program into a memfd and runs it.☆13Updated 3 years ago
- ☆31Updated last month
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆30Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- Windows NTLM Authentication Backdoor☆16Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated 2 years ago
- Golang Implementation of Hell's gate☆17Updated 2 years ago
- Linux Sleep Obfuscation☆97Updated last year
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆14Updated 9 months ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated 2 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆29Updated 2 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆19Updated 5 months ago