nbulischeck / debugfs-backdoorLinks
PoC code using debugfs to store files in memory and execute them
☆27Updated 7 years ago
Alternatives and similar repositories for debugfs-backdoor
Users that are interested in debugfs-backdoor are comparing it to the libraries listed below
Sorting:
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Skeleton project for your own GRUB-based bootkit☆16Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 5 months ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- exploit for CVE-2018-4193☆69Updated 6 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- ☆87Updated last year
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Format string exploitation helper☆45Updated 9 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- ☆46Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- Export disassemblies into Protocol Buffers☆21Updated 3 months ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆36Updated 5 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- ☆43Updated 7 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Apply YARA rules to your Cutter projects.☆16Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 6 years ago
- A repository for my conference presentations☆35Updated 5 years ago