m1m1x / memdlopenLinks
dlopen from memory
☆219Updated 10 years ago
Alternatives and similar repositories for memdlopen
Users that are interested in memdlopen are comparing it to the libraries listed below
Sorting:
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Updated 9 years ago
- Linux based inter-process code injection without ptrace(2)☆253Updated 8 years ago
- midgetpack is a multiplatform secure ELF packer☆204Updated 11 years ago
- ELF DSO injector☆67Updated 3 months ago
- A ptrace library for easy syscall injection in Linux.☆183Updated last year
- Cross Architecture Shellcode in C☆205Updated 9 years ago
- Collection of simple anti-debugging tricks for Linux☆58Updated 7 years ago
- x86 Inline hooking engine (using trampolines)☆98Updated 10 years ago
- a quick open/close/ioctl/read/write/free function hooker☆190Updated 8 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆175Updated 5 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- Toolkit to detect/crash/attack GNU debugging-related tools☆153Updated 9 years ago
- Obfuscates dynamic symbol table☆135Updated 6 years ago
- Process dump to executable ELF for linux☆106Updated 3 years ago
- a bare metal (type 1) VMM (hypervisor) with a python remote control API☆184Updated 7 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- The ultimate hooking library☆273Updated 4 years ago
- TLB splitting VMM☆168Updated 9 years ago
- A Turing complete ROP compiler☆327Updated 12 years ago
- ELF shared library import table patching for function redirection.☆193Updated 4 years ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆448Updated 4 months ago
- Simple Function calls tracer☆73Updated 7 years ago
- add symbols back into a stripped ELF binary (~strip)☆175Updated 8 years ago
- Example of how to use the ptrace(2) system call to call a userspace method.☆150Updated 6 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆139Updated 8 years ago
- windows syscall table from xp ~ 10 rs4☆354Updated 7 years ago
- Tiny loaders for various binary formats.☆241Updated 9 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Updated 8 years ago
- IntelVT-X nice feature -> tool☆95Updated 11 years ago
- PE file manipulation library.☆64Updated 5 years ago