Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
☆141May 27, 2025Updated 9 months ago
Alternatives and similar repositories for memexec
Users that are interested in memexec are comparing it to the libraries listed below
Sorting:
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 2 months ago
- Get root via TTY / TIOCSTI stuffing☆77May 12, 2025Updated 9 months ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆111Jun 23, 2025Updated 8 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 10 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆337Jun 23, 2025Updated 8 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Aug 31, 2023Updated 2 years ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Dec 3, 2024Updated last year
- Proof Of Concepts☆55Jan 4, 2026Updated last month
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 6 months ago
- Linux Shared Library to Shellcode Loader☆80Feb 15, 2026Updated 2 weeks ago
- ☆19Jan 31, 2025Updated last year
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- Make BASH stealthy and hacker friendly with lots of bash functions☆314Feb 8, 2026Updated 3 weeks ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 10 months ago
- ☆53Feb 4, 2025Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- ☆13May 5, 2024Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 3 months ago
- nysm is a stealth post-exploitation container.☆267Jun 19, 2025Updated 8 months ago
- New TIOJ Judge Client☆15Feb 23, 2026Updated last week
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- SSH password logging via PAM☆30Jul 7, 2020Updated 5 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Aug 22, 2016Updated 9 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Backdooring VSCode Projects☆126Jun 5, 2025Updated 8 months ago
- Ghosting-AMSI☆224Apr 24, 2025Updated 10 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆85Jan 26, 2026Updated last month
- HookChain: A new perspective for Bypassing EDR Solutions☆590Jan 5, 2025Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆434Dec 9, 2025Updated 2 months ago
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆314Updated this week
- ☆158Jul 10, 2024Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Simple unpacking script for Ezuri ELF Crypter☆37Jul 28, 2021Updated 4 years ago