n1nj4sec / memorpyLinks
Python library using ctypes to search/edit windows / linux / macOS / SunOS programs memory
☆780Updated 2 years ago
Alternatives and similar repositories for memorpy
Users that are interested in memorpy are comparing it to the libraries listed below
Sorting:
- peinjector - MITM PE file infector☆605Updated 9 years ago
- Brand New Code Injection for Windows☆738Updated 4 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆784Updated 4 years ago
- LLDB MCP Integration + other helpful commands☆729Updated 5 months ago
- Python toolkit for injecting DLL files into running processes on Windows☆252Updated 8 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆996Updated 6 years ago
- pyREtic is an extensible framework for in-memory Python 2.x bytecode reverse engineering☆268Updated 2 years ago
- A shellcode writing toolkit☆679Updated 2 months ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,675Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆1,343Updated 6 years ago
- Teach you a binary exploitation for great good.☆294Updated 7 years ago
- Demos of various injection techniques found in malware☆796Updated 3 years ago
- Interactive shellcoding environment to easily craft shellcodes☆902Updated 4 years ago
- Deprecated Binary Ninja prototype written in Python☆524Updated 4 years ago
- Zero-Day Code Injection and Persistence Technique☆1,241Updated 3 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆458Updated 6 years ago
- metame is a metamorphic code engine for arbitrary executables☆593Updated 5 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- powerful auto-backdooring utility☆752Updated 7 years ago
- Official repository for Pyew.☆390Updated 6 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆803Updated last year
- Remote administration service which uses twitter as a command and control server☆715Updated 4 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆389Updated 6 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆565Updated 8 years ago
- A Reverse Engineering Tool for py2exe applications.☆210Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,377Updated 3 years ago
- Sandboxed Execution Environment☆818Updated 4 years ago
- Various PoCs☆491Updated 5 years ago