gerryamurphy / ForemostLinks
Foremost is a console program to recover files based on their headers, footers, and internal data structures
☆27Updated 8 years ago
Alternatives and similar repositories for Foremost
Users that are interested in Foremost are comparing it to the libraries listed below
Sorting:
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Updated 3 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Write ups for Ph0wn CTF☆48Updated 5 months ago
- Generate backdoored RSA keys using SETUP☆231Updated 2 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- In-Memory Rootkit For Linux and BSD☆87Updated 6 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- Some security by obscurity using port-jumping.☆14Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆138Updated 8 months ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Binary Golf Grand Prix☆84Updated last month
- ☆65Updated 3 years ago
- ☆44Updated 4 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- Create polyglot files, which are valid PDF and ZIP simultaneously. See POC||GTFO 07. (forked from git.hackade.org)☆74Updated 3 months ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆20Updated last year
- ☆98Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Updated last year
- ☆137Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Updated 3 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Updated 6 months ago
- A Repository to Track Anti-Forensic Techniques☆118Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 8 months ago
- Collection of codes focused on Linux rootkits☆195Updated 3 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆43Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆120Updated last year
- Python tool to resolve all strings in Go binaries obfuscated by garble☆188Updated 11 months ago
- Markov Model libraries, optimized for cracking-focused password generations.☆112Updated 4 years ago