jtripper / parasiteLinks
Linux Runtime Process Injection Tool
☆61Updated 12 years ago
Alternatives and similar repositories for parasite
Users that are interested in parasite are comparing it to the libraries listed below
Sorting:
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Updated 11 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- ☆65Updated 9 years ago
- Inject shellcode into running processes in Linux.☆43Updated last year
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57Updated 10 years ago
- ☆28Updated 9 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Updated 6 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- ☆16Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Tunnel IP over ICMP.☆16Updated 9 years ago
- ☆45Updated 5 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- An educational Linux Kernel Rootkit☆33Updated 4 years ago
- A shellcode testing harness.☆70Updated last year
- simple shellcode generator☆114Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Windows Trollware and Persistence Script☆13Updated 10 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Updated 12 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- ☆13Updated 9 years ago