liamg / siphonLinks
Intercept stdin/stdout/stderr for any process
☆199Updated 3 years ago
Alternatives and similar repositories for siphon
Users that are interested in siphon are comparing it to the libraries listed below
Sorting:
- Elf binary infector written in Go.☆211Updated 10 months ago
- It's strace, with colours.☆281Updated 3 years ago
- Run binaries straight from memory in Linux☆321Updated 2 years ago
- Blazing fast, advanced Padding Oracle exploit☆258Updated 2 months ago
- eBPF hacks☆187Updated 11 months ago
- ☆170Updated 3 years ago
- ☆67Updated 4 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆196Updated last year
- Signing-key abuse and update exploitation framework☆131Updated 6 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 6 months ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆333Updated last year
- Analyse binaries for missing security features, information disclosure and more...☆87Updated 2 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆199Updated 7 months ago
- A Server Side Request Forgery (SSRF) protection library. Made with 🖤 by Doyensec LLC.☆107Updated 5 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- Golang reverse/bind shell generator☆228Updated 3 years ago
- io_uring based rootkit☆243Updated 6 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆121Updated 2 years ago
- Fork of pkg/debug that adds some additional functionality.☆127Updated last year
- ☆135Updated last year
- A Simple Linux ELF Runtime Crypter☆262Updated 8 months ago
- Utility to find hidden Linux kernel modules☆146Updated 3 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆142Updated 3 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 5 months ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- ☆50Updated 3 years ago
- Kubernetes exploitation tool☆364Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆137Updated last month
- WallEscape vulnerability in util-linux☆52Updated last year
- Package retryablehttp provides a familiar HTTP client interface with automatic retries and exponential backoff☆145Updated this week