oblique / elf-infectorLinks
ELF binary infector
☆32Updated 14 years ago
Alternatives and similar repositories for elf-infector
Users that are interested in elf-infector are comparing it to the libraries listed below
Sorting:
- runtime code injector for Linux☆27Updated 14 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Updated 8 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- ☆33Updated 9 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 5 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- ☆80Updated 11 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- A collection of shellcodes☆69Updated 13 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- Execute system calls over the network☆11Updated 10 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- ☆36Updated 12 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago