hackerschoice / memexec
Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
☆112Updated last month
Alternatives and similar repositories for memexec:
Users that are interested in memexec are comparing it to the libraries listed below
- Get root via TTY / TIOCSTI stuffing☆71Updated 9 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 3 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆103Updated 3 weeks ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated 11 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆117Updated this week
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆301Updated 3 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆42Updated last month
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆187Updated 3 weeks ago
- ☆94Updated 3 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆129Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆57Updated 4 months ago
- Collection of codes focused on Linux rootkits☆107Updated 2 months ago
- In-Memory Rootkit For Linux☆69Updated 2 weeks ago
- PoCs of RCEs against open source C2 servers☆82Updated 7 months ago
- eBPF hacks☆186Updated 4 months ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆135Updated last year
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆205Updated 3 weeks ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆294Updated 2 weeks ago
- ☆179Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆264Updated 2 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆78Updated 2 months ago
- Linpmem is a linux memory acquisition tool☆82Updated 11 months ago
- Payload encoding utility to effectively lower payload entropy.☆116Updated 3 weeks ago
- Windows Persistence IT-Security☆97Updated last month
- Mara is a userland pty/tty sniffer☆53Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆185Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- CVE-2024-30090 - LPE PoC☆106Updated 6 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆140Updated 3 months ago