fimad / KeeblerLinks
A tool for patching/injecting code into elf binaries.
☆13Updated 12 years ago
Alternatives and similar repositories for Keebler
Users that are interested in Keebler are comparing it to the libraries listed below
Sorting:
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- ELF binary infector☆32Updated 14 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆21Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Shellcode tracer☆15Updated 8 years ago
- The educational Animus malware☆18Updated 5 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 6 months ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Small script to assemble/disassemble from CLI☆22Updated 2 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 3 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago