liamg / siphon
Intercept stdin/stdout/stderr for any process
☆198Updated 2 years ago
Alternatives and similar repositories for siphon:
Users that are interested in siphon are comparing it to the libraries listed below
- Elf binary infector written in Go.☆206Updated last month
- ☆66Updated 3 years ago
- Get root via TTY / TIOCSTI stuffing☆69Updated 7 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆182Updated last year
- 🌒 Shell command obfuscation to avoid detection systems☆124Updated 2 years ago
- Signing-key abuse and update exploitation framework☆123Updated last week
- eBPF hacks☆181Updated 2 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- Blazing fast, advanced Padding Oracle exploit☆244Updated 9 months ago
- A structure-aware HTTP fuzzing library☆210Updated 2 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated 10 months ago
- Golang reverse/bind shell generator☆228Updated 3 years ago
- A Server Side Request Forgery (SSRF) protection library. Made with 🖤 by Doyensec LLC.☆97Updated 9 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆113Updated last year
- Run binaries straight from memory in Linux☆312Updated last year
- nysm is a stealth post-exploitation container.☆242Updated last year
- Kubernetes exploitation tool☆361Updated 6 months ago
- Execute ELF files without dropping them on disk☆490Updated 7 months ago
- Mainpulate, Steal and Modify Windows Tokens in Go☆75Updated last year
- Mara is a userland pty/tty sniffer☆52Updated last year
- It's strace, with colours.☆271Updated 2 years ago
- A Go-based Exploit Framework☆318Updated this week
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆124Updated this week
- Cloud agnostic IAM permissions enumerator☆140Updated 5 months ago
- Find CVE PoCs on GitHub☆142Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆241Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆33Updated 2 years ago
- redirect all TCP/UDP traffic of any program to SOCKS5 proxy☆141Updated 11 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆120Updated 2 years ago
- a deterministic finite automata ranker☆69Updated 3 years ago