Script that dumps running process memory from Linux systems using /proc.
☆80Aug 6, 2013Updated 12 years ago
Alternatives and similar repositories for linux-memory-dumper
Users that are interested in linux-memory-dumper are comparing it to the libraries listed below
Sorting:
- Watch actual usage of memory(RAM) of an Application/Program to debug the memory leak issue☆27Feb 19, 2016Updated 10 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Generic exploit for master key vulnerability in Android☆33Feb 6, 2015Updated 11 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- A tool used to dump the memory of a specific process on Android.☆14Feb 22, 2016Updated 10 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- a port of Ghost's casper theme for Hugo☆22Dec 9, 2018Updated 7 years ago
- Unix/Linux System Programming☆17Jan 1, 2015Updated 11 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- MemcacheD Proof of Concept☆22Mar 6, 2018Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Sign and verify author signatures on git commits☆17Sep 20, 2014Updated 11 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Show symbol list when opening a binary file in Emacs☆18Oct 9, 2016Updated 9 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago