nnsee / fileless-elf-exec
Execute ELF files without dropping them on disk
☆491Updated 10 months ago
Alternatives and similar repositories for fileless-elf-exec
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
Sorting:
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆839Updated last month
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆500Updated 5 months ago
- a tool to help operate in EDRs' blind spots☆730Updated 5 months ago
- Convert shellcode into different formats!☆352Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆187Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆130Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆743Updated last year
- ☆415Updated 2 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆381Updated last year
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆511Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆636Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆917Updated 11 months ago
- ☆301Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆388Updated this week
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆250Updated last year
- ☆489Updated last year
- Comprehensive toolkit for Ghidra headless.☆356Updated 3 weeks ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- nysm is a stealth post-exploitation container.☆246Updated last year
- A modular C2 framework☆466Updated last month
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆438Updated last year
- UAC bypass by abusing RPC and debug objects.☆613Updated last year
- A Simple Linux ELF Runtime Crypter☆248Updated 2 months ago
- ☆750Updated last year
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆388Updated last year
- DPAPI looting remotely and locally in Python☆467Updated last month
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆473Updated last year
- Hide your payload in DNS☆613Updated 2 years ago
- reverse shell using curl☆455Updated last year
- Aims to identify sleeping beacons☆590Updated 5 months ago