nnsee / fileless-elf-execLinks
Execute ELF files without dropping them on disk
☆499Updated last year
Alternatives and similar repositories for fileless-elf-exec
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
Sorting:
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆877Updated 9 months ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆522Updated 6 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆197Updated last year
- a tool to help operate in EDRs' blind spots☆770Updated last year
- Convert shellcode into different formats!☆360Updated 2 years ago
- Elf binary infector written in Go.☆212Updated 11 months ago
- A Simple Linux ELF Runtime Crypter☆264Updated 10 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆395Updated 2 years ago
- Red-Team LKM☆623Updated last week
- ☆427Updated 3 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆261Updated 2 weeks ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Updated 3 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆668Updated 3 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆281Updated 9 months ago
- ☆607Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,196Updated 2 years ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆510Updated last year
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆473Updated 2 years ago
- Comprehensive toolkit for Ghidra headless.☆362Updated 8 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆746Updated 2 years ago
- eBPF hacks☆190Updated last year
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆400Updated 3 weeks ago
- A unique technique to execute binaries from a password protected zip☆1,040Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,056Updated last year
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆296Updated last month
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆471Updated 5 months ago
- Various ways to execute shellcode☆508Updated last year
- Hide your payload in DNS☆615Updated 2 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆615Updated 2 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆550Updated last year