Script that dumps running process memory from Linux systems using /proc.
☆80Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for linux-memory-dumper
Users that are interested in linux-memory-dumper are comparing it to the libraries listed below
Sorting:
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- Sign and verify author signatures on git commits☆17Sep 20, 2014Updated 11 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- MemcacheD Proof of Concept☆22Mar 6, 2018Updated 7 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Unix/Linux System Programming☆17Jan 1, 2015Updated 11 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- An ongoing log of my attempts to write software for the Kindle Keyboard☆17Mar 5, 2019Updated 6 years ago
- TCP proxy with trunking/striping support☆15Jan 1, 2019Updated 7 years ago
- Libevent - event notification☆16May 30, 2019Updated 6 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- a fork of a very cool, but dormant, project at http://www.eresi-project.org/☆21Sep 13, 2012Updated 13 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Defending against malicious USB firmware in the Linux kernel☆17Mar 8, 2016Updated 9 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Jul 1, 2020Updated 5 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- ☆16May 22, 2014Updated 11 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago