runtime code injector for Linux
☆26May 29, 2011Updated 14 years ago
Alternatives and similar repositories for code-injector
Users that are interested in code-injector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- BSoD PoC for CVE-2016-0051 (MS-016)☆10Feb 22, 2016Updated 10 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- wifihack☆41May 5, 2009Updated 16 years ago
- Unlock your Netgear EX2700☆10Oct 31, 2016Updated 9 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Jul 29, 2016Updated 9 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Try various exploits to get root☆19Nov 14, 2013Updated 12 years ago
- Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.☆18Jan 3, 2017Updated 9 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- A high-performance network packet capture library☆14Nov 16, 2025Updated 4 months ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- ELF binary patching utility☆41Nov 25, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- ld-linux code injector☆50Oct 28, 2011Updated 14 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Stealth's 64bit injectso port☆74Jul 31, 2010Updated 15 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39May 23, 2019Updated 6 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆127Dec 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- Tools and library to manipulate EFI variables.☆10Mar 26, 2026Updated 2 weeks ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- One DLL to redirect them all to SOCKS4 server.☆24Oct 15, 2019Updated 6 years ago