nnsee / fileless-elf-exec
Execute ELF files without dropping them on disk
☆491Updated 9 months ago
Alternatives and similar repositories for fileless-elf-exec:
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆825Updated last month
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆185Updated last year
- a tool to help operate in EDRs' blind spots☆728Updated 4 months ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆498Updated 4 months ago
- Convert shellcode into different formats!☆352Updated 2 years ago
- ☆301Updated last year
- A Simple Linux ELF Runtime Crypter☆245Updated last month
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆912Updated 10 months ago
- ☆414Updated 2 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆388Updated last month
- Hide your payload in DNS☆613Updated last year
- eBPF hacks☆186Updated 4 months ago
- Elf binary infector written in Go.☆208Updated 3 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆247Updated 2 years ago
- nysm is a stealth post-exploitation container.☆246Updated last year
- Venom is a library that meant to perform evasive communication using stolen browser socket☆379Updated last year
- PCAP visualization tool☆103Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆435Updated 3 weeks ago
- ☆489Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆127Updated 2 years ago
- CVE-2022-0185☆368Updated 2 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆263Updated last month
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆343Updated 8 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆509Updated 2 years ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆437Updated last year
- Kraken, a modular multi-language webshell coded by @secu_x11☆538Updated last year
- Various ways to execute shellcode☆487Updated last year