djhohnstein / librarianLinks
Shared library loading application for Linux written in Go.
☆17Updated 5 years ago
Alternatives and similar repositories for librarian
Users that are interested in librarian are comparing it to the libraries listed below
Sorting:
- A Portable Executable parser for Golang☆47Updated 8 months ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- ☆20Updated 6 years ago
- Shellcode library as a Go package☆70Updated 5 years ago
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆30Updated 2 years ago
- Finding code caves in ELF files with GoLang☆26Updated 7 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Keep it secret, keep it safe☆78Updated 7 months ago
- ☆33Updated 5 years ago
- Small tool to run ELF binaries from memory with a given process name☆168Updated 3 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Simple DLL to test various injection methods.☆51Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- GoLang binary pclntab mangler☆14Updated 5 years ago
- Fuzz Network Traffic☆18Updated 8 months ago
- Offensive go lang series☆35Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- ☆18Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Pure Go rewrite of knockknock☆11Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 3 years ago
- A collection of shellcode hashes☆17Updated 7 years ago
- ☆48Updated 5 years ago
- DNS server for pentesters☆49Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- ☆28Updated 6 years ago