elfmaster / saruman
ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)
☆135Updated 7 years ago
Alternatives and similar repositories for saruman
Users that are interested in saruman are comparing it to the libraries listed below
Sorting:
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆229Updated 2 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- Linux based inter-process code injection without ptrace(2)☆248Updated 7 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- Linux Rootkit Scanner☆88Updated 3 years ago
- Obfuscates dynamic symbol table☆134Updated 6 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Updated 8 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆186Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- ☆115Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆162Updated 9 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆148Updated 9 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- C++-based shellcode builder☆113Updated 4 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆175Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- A patch analysis tool☆363Updated 4 years ago
- ELF packer - x86_64☆72Updated 9 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆301Updated 6 years ago
- Implementation of the SMM rootkit "The Watcher"☆126Updated 3 years ago
- Linux v4.x.x Rootkit☆90Updated 9 months ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆336Updated 6 years ago