carloslack / volundr
Just another elf parser
☆23Updated last year
Alternatives and similar repositories for volundr:
Users that are interested in volundr are comparing it to the libraries listed below
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆28Updated 4 years ago
- Code injection from Linux kernel to a process☆20Updated last year
- Windows NTLM Authentication Backdoor☆15Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- yet another hidden LKM hunter☆21Updated last year
- BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen☆45Updated 2 years ago
- Non organized Cpp code files I used for my research on Windows☆22Updated 4 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- ☆12Updated last year
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆29Updated last year
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆27Updated 5 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- Golang Shlyuz Implant Implementation☆12Updated 2 years ago
- Loads a program into a memfd and runs it.☆12Updated 2 years ago
- Unpacker for donut shellcode☆17Updated 4 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated 3 weeks ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Adobe Reader DC Information Leak Exploit☆21Updated 2 years ago
- ☆27Updated 5 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆28Updated last year
- Load a dynamic library from memory using a fuse mount☆31Updated last year
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- Pure Go rewrite of knockknock☆10Updated 2 years ago
- Small utility package for manipulating Windows process tokens☆26Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago