Library for Dissect and Infect ELF Binaries.
☆40Apr 27, 2025Updated 10 months ago
Alternatives and similar repositories for libmalelf
Users that are interested in libmalelf are comparing it to the libraries listed below
Sorting:
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Toolkit to detect/crash/attack GNU debugging-related tools☆153Apr 5, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 11 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 8 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Script that dumps running process memory from Linux systems using /proc.☆80Aug 6, 2013Updated 12 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Automatic ROP chain generator☆12Mar 29, 2015Updated 10 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Artificial Neural Network implementation in Common Lisp☆10Mar 3, 2019Updated 6 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Telegram Bot that imitates @lerax (@ryukinix) behavior, 'cause he is a legend.☆11Jul 23, 2020Updated 5 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago