liamg / siphonLinks
Intercept stdin/stdout/stderr for any process
☆198Updated 2 years ago
Alternatives and similar repositories for siphon
Users that are interested in siphon are comparing it to the libraries listed below
Sorting:
- Elf binary infector written in Go.☆211Updated 6 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- Signing-key abuse and update exploitation framework☆130Updated 2 months ago
- Run binaries straight from memory in Linux☆318Updated 2 years ago
- Blazing fast, advanced Padding Oracle exploit☆254Updated last year
- eBPF hacks☆187Updated 7 months ago
- A Server Side Request Forgery (SSRF) protection library. Made with 🖤 by Doyensec LLC.☆104Updated 2 months ago
- Analyse binaries for missing security features, information disclosure and more...☆86Updated last year
- ☆169Updated 2 years ago
- ☆67Updated 3 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆191Updated last year
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆329Updated 10 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆88Updated 2 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- Golang reverse/bind shell generator☆229Updated 3 years ago
- It's strace, with colours.☆276Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆46Updated 2 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆200Updated 4 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated last year
- nysm is a stealth post-exploitation container.☆253Updated last month
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆271Updated 4 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 9 months ago
- ☆104Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- a deterministic finite automata ranker☆71Updated 3 years ago
- WallEscape vulnerability in util-linux☆51Updated last year
- 🌒 Shell command obfuscation to avoid detection systems☆125Updated 2 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆100Updated 2 years ago
- A Go-based Exploit Framework☆351Updated this week
- Cloud agnostic IAM permissions enumerator☆151Updated 3 months ago