jtripper / parasiteLinks
Linux Runtime Process Injection Tool
☆61Updated 12 years ago
Alternatives and similar repositories for parasite
Users that are interested in parasite are comparing it to the libraries listed below
Sorting:
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Updated 11 years ago
- ☆65Updated 8 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Updated 5 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆61Updated 12 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- ☆16Updated 9 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- A shellcode testing harness.☆70Updated last year
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Inject shellcode into running processes in Linux.☆44Updated last year
- hax 'n shit☆120Updated 10 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- ☆44Updated 5 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆49Updated 4 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago