hc0d3r / ignotum
a simple lib to help read and write in the memory of a linux process
☆13Updated 5 years ago
Alternatives and similar repositories for ignotum:
Users that are interested in ignotum are comparing it to the libraries listed below
- Malware analysis tool☆22Updated 10 years ago
- ☆12Updated 8 years ago
- A collection of shellcodes☆67Updated 12 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- ☆28Updated 8 years ago
- Alternative hexdump.☆15Updated 9 years ago
- ☆15Updated 8 years ago
- ☆14Updated 9 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆10Updated 2 months ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆21Updated 10 years ago
- python inspect rootkit tool☆34Updated 11 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Popping boxes with Nmap☆18Updated 12 years ago