nnsee / fileless-elf-execLinks
Execute ELF files without dropping them on disk
☆492Updated 11 months ago
Alternatives and similar repositories for fileless-elf-exec
Users that are interested in fileless-elf-exec are comparing it to the libraries listed below
Sorting:
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆849Updated 3 months ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆505Updated last week
- Elf binary infector written in Go.☆210Updated 5 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆189Updated last year
- A Simple Linux ELF Runtime Crypter☆256Updated 3 months ago
- a tool to help operate in EDRs' blind spots☆738Updated 6 months ago
- Hide your payload in DNS☆614Updated 2 years ago
- ☆302Updated last year
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆442Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆946Updated last year
- nysm is a stealth post-exploitation container.☆250Updated this week
- A tool to make socks connections through HTTP agents☆707Updated 4 years ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- ☆416Updated 2 years ago
- ☆784Updated 2 years ago
- Red-Team Linux kernel rootkit☆504Updated 2 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆383Updated last year
- Windows Privilege Escalation from User to Domain Admin.☆1,398Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆976Updated 2 years ago
- A modular C2 framework☆476Updated 2 months ago
- reverse shell using curl☆457Updated last year
- Linux PAM Backdoor☆336Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆641Updated 2 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆378Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆706Updated 3 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆511Updated 2 years ago
- CVE-2022-0185☆371Updated 3 years ago
- PCAP visualization tool☆103Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,187Updated last year
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆202Updated 3 years ago