hc0d3r / ignotum
a simple lib to help read and write in the memory of a linux process
☆13Updated 5 years ago
Alternatives and similar repositories for ignotum:
Users that are interested in ignotum are comparing it to the libraries listed below
- A collection of shellcodes☆67Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Malware analysis tool☆22Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- ☆12Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A script to reverse-engineer anti-virus signatures☆32Updated 11 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- recon framework in ruby☆13Updated 13 years ago
- ☆14Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆13Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 10 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 7 years ago
- ☆15Updated 8 years ago
- Archive of Metasploit Framework v2 (Perl)☆15Updated 10 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- ☆42Updated 6 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago