Library for Dissect and Infect ELF Binaries.
☆40Apr 27, 2025Updated 10 months ago
Alternatives and similar repositories for libmalelf
Users that are interested in libmalelf are comparing it to the libraries listed below
Sorting:
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Toolkit to detect/crash/attack GNU debugging-related tools☆153Apr 5, 2016Updated 9 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 9 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 12 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Jun 29, 2015Updated 10 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- Script that dumps running process memory from Linux systems using /proc.☆80Aug 6, 2013Updated 12 years ago
- Artificial Neural Network implementation in Common Lisp☆10Mar 3, 2019Updated 7 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- core utilities☆11Oct 20, 2019Updated 6 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- A very rudimentary Android DEX file parser☆65Aug 26, 2014Updated 11 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆153Dec 18, 2023Updated 2 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- Telegram Bot that imitates @lerax (@ryukinix) behavior, 'cause he is a legend.☆11Jul 23, 2020Updated 5 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75May 8, 2018Updated 7 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago