Code injection from Linux kernel to a process
☆24May 19, 2023Updated 2 years ago
Alternatives and similar repositories for kjector
Users that are interested in kjector are comparing it to the libraries listed below
Sorting:
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 5 years ago
- Kernel mode to user mode so injection☆94Nov 6, 2020Updated 5 years ago
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated 2 years ago
- Threat Hijacking Simple Implementation☆19Feb 24, 2025Updated last year
- Matryoshka - stacked LKM loader☆54Oct 8, 2023Updated 2 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- Linux Kernel hooking engine (x86)☆389Oct 14, 2025Updated 5 months ago
- ☆10Aug 9, 2024Updated last year
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- EVM Emergency wallet drainer☆11Aug 2, 2023Updated 2 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- Download and loader .NET payload☆36Oct 8, 2019Updated 6 years ago
- ☆71Jan 1, 2026Updated 2 months ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- ☆12Aug 11, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- various small things not worth their own repo☆33Feb 11, 2026Updated last month
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Lepton is a Lightweight ELF Parsing Tool that was designed specifically for analyzing and editing binaries with damaged or corrupted ELF …☆36May 9, 2021Updated 4 years ago
- ELF DSO injector☆73Jun 23, 2025Updated 9 months ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A statically typed version of pest.☆12Dec 2, 2025Updated 3 months ago
- Breaking secure checksums in the scudo heap allocator☆13Apr 9, 2020Updated 5 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆174Dec 31, 2023Updated 2 years ago
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago