nnsee / fileless-elf-execLinks
Execute ELF files without dropping them on disk
☆498Updated last year
Alternatives and similar repositories for fileless-elf-exec
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
Sorting:
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆870Updated 7 months ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆517Updated 5 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆196Updated last year
- a tool to help operate in EDRs' blind spots☆765Updated 11 months ago
- Comprehensive toolkit for Ghidra headless.☆362Updated 6 months ago
- Convert shellcode into different formats!☆359Updated 2 years ago
- Elf binary infector written in Go.☆211Updated 10 months ago
- A Simple Linux ELF Runtime Crypter☆262Updated 8 months ago
- ☆423Updated 3 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆259Updated 2 years ago
- Red-Team Linux kernel rootkit☆597Updated 2 weeks ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆394Updated 2 years ago
- eBPF hacks☆188Updated 11 months ago
- ☆308Updated 2 years ago
- Hide your payload in DNS☆615Updated 2 years ago
- CVE-2022-0185☆372Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆142Updated 3 years ago
- reverse shell using curl☆466Updated last year
- nysm is a stealth post-exploitation container.☆263Updated 4 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆748Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆661Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,195Updated 2 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆467Updated 4 months ago
- A unique technique to execute binaries from a password protected zip☆1,033Updated 3 years ago
- LD_PRELOAD rootkit☆138Updated last year
- ☆207Updated last year
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆525Updated 3 years ago
- ☆596Updated 2 weeks ago
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆293Updated last week