nnsee / fileless-elf-exec
Execute ELF files without dropping them on disk
☆491Updated 9 months ago
Alternatives and similar repositories for fileless-elf-exec:
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆821Updated last week
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆183Updated last year
- a tool to help operate in EDRs' blind spots☆722Updated 3 months ago
- Elf binary infector written in Go.☆208Updated 2 months ago
- Hide your payload in DNS☆613Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆904Updated 9 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆435Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,173Updated last year
- reverse shell using curl☆454Updated 11 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆506Updated 2 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆490Updated 3 months ago
- A Simple Linux ELF Runtime Crypter☆240Updated last month
- Convert shellcode into different formats!☆349Updated 2 years ago
- nysm is a stealth post-exploitation container.☆245Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆127Updated 2 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆579Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆743Updated last year
- CVE-2022-0185☆368Updated 2 years ago
- A tool to make socks connections through HTTP agents☆691Updated 4 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆208Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆957Updated 2 years ago
- ☆300Updated last year
- Venom is a library that meant to perform evasive communication using stolen browser socket☆377Updated last year
- Comprehensive toolkit for Ghidra headless.☆353Updated last year
- ☆411Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,033Updated last year
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆386Updated 2 weeks ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆109Updated last year
- CVE-2023-4911 proof of concept☆167Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆736Updated 3 years ago