oblique / code-injector
runtime code injector for Linux
☆27Updated 13 years ago
Alternatives and similar repositories for code-injector:
Users that are interested in code-injector are comparing it to the libraries listed below
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- ELF binary infector☆32Updated 13 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- SNMP Backdoor Communication Channel☆15Updated 13 years ago
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 7 years ago
- ☆17Updated 6 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆10Updated last month
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Shellcode tracer☆15Updated 8 years ago
- Linux kernel module netfilter backdoor demo☆8Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago