fksvs / injectLinks
Packet crafting, injection and sniffing tool
☆69Updated last month
Alternatives and similar repositories for inject
Users that are interested in inject are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- ☆33Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆35Updated this week
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- Make an Linux Kernel rootkit visible again.☆55Updated 6 months ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- hiding in plain sight: part 2☆45Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆40Updated 4 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- ☆19Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 5 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 7 months ago
- ☆37Updated 6 months ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- API hooking and code injection made easy!☆39Updated 2 years ago
- ASUS wifi router RCE vulnerability☆18Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆16Updated 4 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year