ELF binary infector
☆33May 25, 2011Updated 14 years ago
Alternatives and similar repositories for elf-infector
Users that are interested in elf-infector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- Rex library for text generation and manipulation☆21Apr 10, 2026Updated last week
- ELF binary patching utility☆41Nov 25, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 6 months ago
- Created by David Maloney via the GitHub Connector☆12Mar 27, 2026Updated 3 weeks ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- ELF obfuscator☆70Aug 14, 2015Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code injection + payload communications for OSX (incl. sandboxed apps)☆24Sep 24, 2014Updated 11 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated last year
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Dec 26, 2016Updated 9 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- ELF packer - x86_64☆72Jul 27, 2015Updated 10 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Official Stripe Mirakl Connector☆11Mar 31, 2026Updated 2 weeks ago
- Devestating and awesome Linux X86_64 ELF Virus☆239Sep 9, 2022Updated 3 years ago
- Unlock your Netgear EX2700☆10Oct 31, 2016Updated 9 years ago
- Linux BootKit☆33Sep 11, 2017Updated 8 years ago
- ☆14Aug 12, 2015Updated 10 years ago
- ELF DSO injector☆73Jun 23, 2025Updated 9 months ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- a better basefinder☆12Aug 25, 2021Updated 4 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Replication Package of "IoT Bugs and Development Challenges" study☆12Feb 20, 2021Updated 5 years ago
- Emacs: incremental search for the kill ring☆13Apr 22, 2014Updated 11 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Program for cryptanalyzing xor "encryption" with variable key length☆46Jun 8, 2009Updated 16 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago