nnsee / fileless-elf-execLinks
Execute ELF files without dropping them on disk
☆501Updated last year
Alternatives and similar repositories for fileless-elf-exec
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
Sorting:
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆878Updated 9 months ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆523Updated 7 months ago
- Convert shellcode into different formats!☆357Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆766Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆197Updated 2 years ago
- Hide your payload in DNS☆618Updated 2 years ago
- ☆310Updated 2 years ago
- A Simple Linux ELF Runtime Crypter☆265Updated 10 months ago
- CVE-2022-0185☆377Updated 3 years ago
- ☆431Updated 3 years ago
- PoC for CVE-2023-4911☆388Updated 2 years ago
- Elf binary infector written in Go.☆214Updated last year
- A unique technique to execute binaries from a password protected zip☆1,040Updated 3 years ago
- reverse shell using curl☆475Updated last year
- Root shell PoC for CVE-2021-3156☆156Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆748Updated 2 years ago
- Red-Team LKM☆627Updated 3 weeks ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Updated 2 years ago
- LD_PRELOAD rootkit☆137Updated last year
- Comprehensive toolkit for Ghidra headless.☆362Updated 8 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆395Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆671Updated 3 years ago
- nysm is a stealth post-exploitation container.☆264Updated 6 months ago
- ☆207Updated last year
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆474Updated 2 years ago
- ☆609Updated 2 months ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆262Updated last month
- Spartacus DLL/COM Hijacking Toolkit☆1,077Updated last year
- eBPF hacks☆194Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆796Updated 3 years ago