liamg / siphonLinks
Intercept stdin/stdout/stderr for any process
☆199Updated 2 years ago
Alternatives and similar repositories for siphon
Users that are interested in siphon are comparing it to the libraries listed below
Sorting:
- Elf binary infector written in Go.☆211Updated 8 months ago
- ☆169Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆193Updated last year
- eBPF hacks☆187Updated 9 months ago
- ☆67Updated 4 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 2 years ago
- Blazing fast, advanced Padding Oracle exploit☆256Updated last week
- Get root via TTY / TIOCSTI stuffing☆76Updated 4 months ago
- Run binaries straight from memory in Linux☆319Updated 2 years ago
- Analyse binaries for missing security features, information disclosure and more...☆86Updated 2 years ago
- It's strace, with colours.☆277Updated 2 years ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆329Updated last year
- Signing-key abuse and update exploitation framework☆130Updated 3 months ago
- io_uring based rootkit☆233Updated 4 months ago
- A Server Side Request Forgery (SSRF) protection library. Made with 🖤 by Doyensec LLC.☆105Updated 3 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- Mara is a userland pty/tty sniffer☆54Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆122Updated 3 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated 2 years ago
- WallEscape vulnerability in util-linux☆52Updated last year
- Golang reverse/bind shell generator☆229Updated 3 years ago
- decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook☆14Updated 3 years ago
- A Go-based Exploit Framework☆359Updated last week
- ☆104Updated 2 years ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆128Updated 4 months ago
- Cloud agnostic IAM permissions enumerator☆157Updated 5 months ago
- Kubernetes Unhinged Shell 😎☆46Updated 2 years ago
- Web interface to explore Suricata EVE outputs☆68Updated 3 weeks ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆131Updated 10 months ago
- Kubernetes exploitation tool☆363Updated last year