oblique / elf-infectorView external linksLinks
ELF binary infector
☆33May 25, 2011Updated 14 years ago
Alternatives and similar repositories for elf-infector
Users that are interested in elf-infector are comparing it to the libraries listed below
Sorting:
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- ELF binary patching utility☆41Nov 25, 2015Updated 10 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 8 years ago
- elfcrypter is a free, open source, ELF ( Executable and Linkable Format ) software protector, written in C/C++ and Assembler. Support for…☆28Feb 20, 2014Updated 11 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- Linux backdoor using ICMP payload for activation☆11Nov 18, 2014Updated 11 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- ELF DSO injector☆73Jun 23, 2025Updated 7 months ago
- Original code about binary encryption from phrack☆71May 11, 2012Updated 13 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 13 years ago
- (ARM Thumb) Re-Assembler utility for reverse engineering☆17May 6, 2018Updated 7 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- ld-linux code injector☆50Oct 28, 2011Updated 14 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- ELF packer - x86_64☆74Jul 27, 2015Updated 10 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Small script to determine valid immediate values for ARM assembly☆19Nov 25, 2019Updated 6 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Rex library for text generation and manipulation☆21Apr 9, 2025Updated 10 months ago
- A smali emulator.☆25Jun 27, 2018Updated 7 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Tracks runtime instruction execution in Linux programs☆36Aug 25, 2013Updated 12 years ago
- ☆23May 11, 2017Updated 8 years ago
- One DLL to redirect them all to SOCKS4 server.☆24Oct 15, 2019Updated 6 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Sep 5, 2014Updated 11 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 4 months ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆59Mar 8, 2018Updated 7 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆66Nov 10, 2017Updated 8 years ago
- repository with additional materials and source code☆32Jan 18, 2017Updated 9 years ago
- Linux BootKit☆32Sep 11, 2017Updated 8 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago