nnsee / fileless-elf-exec
Execute ELF files without dropping them on disk
☆482Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for fileless-elf-exec
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆799Updated last year
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆470Updated last month
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆180Updated 10 months ago
- a tool to help operate in EDRs' blind spots☆654Updated 7 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆373Updated last year
- Convert shellcode into different formats!☆343Updated last year
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆223Updated 4 months ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆563Updated last year
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆482Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆500Updated 2 years ago
- eBPF hacks☆173Updated 2 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆117Updated 2 years ago
- Elf binary infector written in Go.☆206Updated last year
- ☆296Updated last year
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆687Updated 8 months ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆315Updated 2 weeks ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆399Updated last year
- Hide your payload in DNS☆603Updated last year
- ☆407Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆621Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆724Updated 3 years ago
- PCAP visualization tool☆101Updated last year
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆366Updated 3 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆928Updated 2 years ago
- Bring your own print driver privilege escalation tool☆247Updated 3 years ago
- Dump the memory of a PPL with a userland exploit☆846Updated 2 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆817Updated this week
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆863Updated 5 months ago
- collect for learning cases☆567Updated 5 months ago