A tool for modding programs on Linux at runtime. Scans memory for values and changes instructions.
☆18Dec 20, 2020Updated 5 years ago
Alternatives and similar repositories for proctal
Users that are interested in proctal are comparing it to the libraries listed below
Sorting:
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- Assembler from scratch written in Ink, supporting ELF on x86_64 and more.☆27Apr 25, 2021Updated 4 years ago
- Tetris game written from scratch in NASM x64 assembly for 64 bit Linux☆28Sep 26, 2020Updated 5 years ago
- A console for assemble/disassemble code using capstone/keystone☆32May 14, 2018Updated 7 years ago
- Small Rust programs that do weird things☆30Feb 13, 2026Updated 2 weeks ago
- ☆12Oct 24, 2020Updated 5 years ago
- Simple unpacking script for Ezuri ELF Crypter☆37Jul 28, 2021Updated 4 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- A fun little program that simulates Joshua from WarGames☆11Nov 18, 2018Updated 7 years ago
- 内含13种poc,数据包自动解析,扫描☆10Jan 8, 2020Updated 6 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- ExploitDB toolkit ExploitDB辅助工具☆11Jul 27, 2021Updated 4 years ago
- 一键激活Windows的KMS bat激活脚本☆15May 13, 2019Updated 6 years ago
- Python module to check for system call numbers☆11Sep 18, 2023Updated 2 years ago
- 实用性的脚本: Python Shell Bat☆10Mar 12, 2025Updated 11 months ago
- This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.☆14Oct 9, 2023Updated 2 years ago
- Old Photo Restoration (Deep Latent Space Translation)☆12Dec 7, 2020Updated 5 years ago
- 甲方企业安全建设开源之路☆10Oct 11, 2018Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- malloc for memory-mapped files☆14Jun 25, 2020Updated 5 years ago
- ☆55Updated this week
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- SIP protocol command line sniffer☆13Apr 16, 2020Updated 5 years ago
- Really stupid re-implementation of invoke-wmiexec☆13Jul 14, 2022Updated 3 years ago
- A simple polymorphic engine☆45Aug 8, 2019Updated 6 years ago
- ...Webshell☆16Jul 2, 2020Updated 5 years ago
- Try to implement Hybrid Attention Net mentioned in 'Listening to Chaotic Whispers'☆11Feb 28, 2021Updated 5 years ago
- anything I find interesting regarding reverse engineering☆13May 7, 2017Updated 8 years ago
- ☆48Jan 15, 2026Updated last month
- auto MITM attack tools☆14Oct 11, 2023Updated 2 years ago
- A tiny PID 1 for containers, written in x86-64 NASM and ARM64 GAS.☆20Feb 23, 2026Updated last week
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆20Sep 1, 2022Updated 3 years ago
- ☆12Jan 2, 2018Updated 8 years ago
- CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数☆14Dec 17, 2021Updated 4 years ago
- 狮子鱼批量利用☆12Jan 6, 2022Updated 4 years ago
- php之md5类型靶场☆10Feb 6, 2021Updated 5 years ago