itchio / elevateLinks
Command-line privilege elevation for Windows
☆23Updated 9 years ago
Alternatives and similar repositories for elevate
Users that are interested in elevate are comparing it to the libraries listed below
Sorting:
- Authenticated Blowfish-encrypted pipe☆24Updated 7 years ago
- Tracks runtime instruction execution in Linux programs☆36Updated 12 years ago
- asrepl: x86-64 assembly REPL☆71Updated 8 years ago
- Encodes data into printable Unicode characters.☆90Updated 9 months ago
- Scripting Assembly Language☆12Updated 10 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago
- Small script to assemble/disassemble from CLI☆23Updated 3 years ago
- ROP gadget finder and analysis in pure Javascript☆27Updated 3 years ago
- Some cool game hacks☆21Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- System tracer implementation in Rust☆32Updated 9 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13Updated 5 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- KaitaiFS: mount any filesystem specified with a .ksy as a real file system☆57Updated 2 years ago
- An IDA plugin for GC DSP reverse engineering☆33Updated 4 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Updated 7 years ago
- Malware analysis tool☆22Updated 9 months ago
- Library and tools to access the executable (EXE) format☆45Updated last month
- Run commands with hidden console.☆31Updated 5 years ago
- ☆35Updated 13 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- ARM is Turing-complete without data fetches☆58Updated 7 years ago
- CVE-2016-5195 exploit written in Crystal☆13Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 10 months ago
- ld_preload userland rootkit☆35Updated 5 years ago
- Ghidra consonance and make it more ida-ish☆16Updated 6 years ago
- X86/X64/ARM/MIPS Assembler/Disassembler/Decomposer Library☆38Updated 6 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago