An injector that use PT_LOAD technique
☆12Nov 27, 2022Updated 3 years ago
Alternatives and similar repositories for PT_LOAD-Injector
Users that are interested in PT_LOAD-Injector are comparing it to the libraries listed below
Sorting:
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Rust implementation of SafePOSIX☆13May 13, 2025Updated 10 months ago
- ☆10Jun 11, 2022Updated 3 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- Welcome to the Lind sandbox monorepo! See our docs below:☆19Updated this week
- A blog where I write stuffs in order to understand them better.☆12Apr 25, 2025Updated 10 months ago
- ☆13Dec 29, 2022Updated 3 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- iettnext: ai-backed, next-generation mobile application for istanbul's transport☆30Jan 22, 2026Updated 2 months ago
- Lightweight Cryptographic Framework for Internet of Drones☆19Sep 29, 2018Updated 7 years ago
- Rust bindings for VMProtect.☆28Mar 8, 2024Updated 2 years ago
- load macho files in memory without touching the Disk☆44Sep 16, 2022Updated 3 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆29Oct 27, 2022Updated 3 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Oct 12, 2021Updated 4 years ago
- Chatting with a single gmail draft via the Gmail API☆13Mar 10, 2020Updated 6 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software☆18Oct 10, 2023Updated 2 years ago
- Pocsuite3 For CVE-2021-22205☆86Oct 28, 2021Updated 4 years ago
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Sep 29, 2022Updated 3 years ago
- CNVD-2021-10543:MessageSolution 企业邮件归档管理系统 EEA 存在信息泄露漏洞☆13Mar 28, 2021Updated 4 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- PoC that measures how long it takes the CPU to execute the CPUID instruction and reports if it suspects a VM. Works on both Windows and L…☆26Sep 11, 2020Updated 5 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- A swiss army knife for pentesting networks☆25Sep 3, 2022Updated 3 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- Code injection from Linux kernel to a process☆24May 19, 2023Updated 2 years ago
- ☆19Jan 10, 2026Updated 2 months ago
- ☆11Oct 13, 2020Updated 5 years ago