ecos-wtf / ecoshell
Shellcode generation for eCOS platform.
☆14Updated 4 years ago
Alternatives and similar repositories for ecoshell
Users that are interested in ecoshell are comparing it to the libraries listed below
Sorting:
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- ☆27Updated 5 years ago
- A PNG file-smuggling tool and library!☆25Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 6 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Chrome cookie dumper☆17Updated 4 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- Code injection from Linux kernel to a process☆21Updated last year
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- From IoT Pentesting to IoT Security☆22Updated 6 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- A Python IDA Plugin that finds a route from one function to another.☆12Updated 6 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆54Updated 3 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- Tools for viewing and extracting HDD firmware files☆73Updated 10 years ago
- ☆33Updated 7 years ago
- ☆48Updated 4 years ago
- Reverse Windows shell over TLS☆19Updated 9 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago