magisterquis / bin2memfdView external linksLinks
Loads a program into a memfd and runs it.
☆11May 22, 2022Updated 3 years ago
Alternatives and similar repositories for bin2memfd
Users that are interested in bin2memfd are comparing it to the libraries listed below
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- ☆12Mar 24, 2018Updated 7 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- ☆31Jul 26, 2024Updated last year
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- ☆15Jan 26, 2023Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Library and applications for interfacing with eidc32 and intelli-m☆13Oct 18, 2021Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Aug 10, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆42Feb 18, 2025Updated 11 months ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated last month
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- ☆20Nov 5, 2025Updated 3 months ago
- ☆24Sep 26, 2021Updated 4 years ago
- Get some useful data from Clouds for your targets☆20Updated this week
- Shared library loading application for Linux written in Go.☆16Aug 31, 2020Updated 5 years ago
- ☆27May 6, 2024Updated last year
- History and analysis of Windows desktop images☆19Jan 28, 2021Updated 5 years ago
- ☆23Apr 28, 2024Updated last year
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Example of building an application verifer DLL☆51Jun 1, 2024Updated last year
- ☆59Oct 24, 2024Updated last year