nnsee / fileless-elf-execLinks
Execute ELF files without dropping them on disk
☆494Updated last year
Alternatives and similar repositories for fileless-elf-exec
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
Sorting:
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆851Updated 3 months ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆507Updated last month
- a tool to help operate in EDRs' blind spots☆742Updated 7 months ago
- Red-Team Linux kernel rootkit☆514Updated 2 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆191Updated last year
- Convert shellcode into different formats!☆353Updated 2 years ago
- ☆416Updated 2 years ago
- A Simple Linux ELF Runtime Crypter☆257Updated 4 months ago
- Comprehensive toolkit for Ghidra headless.☆358Updated 2 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆646Updated 2 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆384Updated last year
- Elf binary infector written in Go.☆211Updated 6 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆446Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆966Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,190Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆136Updated 2 years ago
- Hide your payload in DNS☆613Updated 2 years ago
- A modular C2 framework☆482Updated 3 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆398Updated 2 weeks ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆590Updated last year
- ☆304Updated 2 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆379Updated 3 years ago
- LD_PRELOAD rootkit☆133Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆978Updated 2 years ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆385Updated last month
- nysm is a stealth post-exploitation container.☆252Updated 3 weeks ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆741Updated 3 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,050Updated last year
- CVE-2022-0185☆371Updated 3 years ago