citypw / lcamtuf-memfetchLinks
Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is an attractive alternative to the vastly inferior search capabilities of many debuggers and tracers - and a convenient way to grab "screenshots" from many types of text-based interactive utilities.
☆42Updated 7 years ago
Alternatives and similar repositories for lcamtuf-memfetch
Users that are interested in lcamtuf-memfetch are comparing it to the libraries listed below
Sorting:
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated last year
- An ELF parasite command injector.☆34Updated 7 years ago
- Memory forensics of virtualization environments☆47Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 7 years ago
- r2yara - Module for Yara using radare2 information☆35Updated last year
- Execute system calls over the network☆11Updated 10 years ago
- GDB cheatsheet for reversing binaries☆21Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- ☆65Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆27Updated 5 years ago
- Slides, papers, etc☆31Updated last year
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Created by David Maloney via the GitHub Connector☆12Updated 4 months ago
- Information Security News☆61Updated last year
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 9 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- A collection of shellcodes☆69Updated 13 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago