Stealth's 64bit injectso port
☆74Jul 31, 2010Updated 15 years ago
Alternatives and similar repositories for injectso64
Users that are interested in injectso64 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.☆49Jul 10, 2011Updated 14 years ago
- ELF DSO injector☆72Jun 23, 2025Updated 10 months ago
- ☆11Sep 26, 2019Updated 6 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 11 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- This is the code for the tutorial/book named Writing Netfilter Modules☆21Dec 1, 2023Updated 2 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Python module to control network interfaces.☆21Oct 29, 2018Updated 7 years ago
- pre-release.☆12Jul 15, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated 2 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Aug 7, 2014Updated 11 years ago
- Triton based R2 plugin for concolic execution and total control☆35Nov 26, 2018Updated 7 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 9 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- Android sandboxing (ptrace based)☆14Jul 21, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago
- Tool for injecting a shared object into a Linux process☆1,228Feb 23, 2022Updated 4 years ago
- ☆14Sep 29, 2019Updated 6 years ago
- An application to dynamically inject a shared object into a running process on ARM architectures.☆455Sep 26, 2016Updated 9 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- Mirror of Apache Harmony DRLVM☆14Mar 21, 2010Updated 16 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated 2 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ELF packer/crypter that aims to create hardened and stealthy troyans☆59Dec 25, 2021Updated 4 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 11 years ago
- Matryoshka - stacked LKM loader☆55Oct 8, 2023Updated 2 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- ☆14Apr 28, 2016Updated 10 years ago