nnsee / fileless-elf-execLinks
Execute ELF files without dropping them on disk
☆495Updated last year
Alternatives and similar repositories for fileless-elf-exec
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
Sorting:
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆858Updated 5 months ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆511Updated 2 months ago
- Convert shellcode into different formats!☆358Updated 2 years ago
- ☆302Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆191Updated last year
- A Simple Linux ELF Runtime Crypter☆259Updated 5 months ago
- ☆417Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆752Updated 8 months ago
- Comprehensive toolkit for Ghidra headless.☆357Updated 4 months ago
- Root shell PoC for CVE-2021-3156☆153Updated 3 years ago
- Elf binary infector written in Go.☆211Updated 7 months ago
- Hide your payload in DNS☆615Updated 2 years ago
- LPE exploit for CVE-2023-21768☆424Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- ☆583Updated 2 months ago
- eBPF hacks☆187Updated 8 months ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆509Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆654Updated 2 years ago
- Red-Team Linux kernel rootkit☆544Updated 2 weeks ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆455Updated last year
- ☆205Updated 9 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆388Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆256Updated last year
- it is very good☆519Updated 2 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆415Updated last month
- PoC for CVE-2023-4911☆388Updated last year
- A toolbox for extracting RSA private keys from public keys.☆187Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆598Updated last year