sad0p / d0zer
Elf binary infector written in Go.
☆208Updated 2 months ago
Alternatives and similar repositories for d0zer:
Users that are interested in d0zer are comparing it to the libraries listed below
- A Simple Linux ELF Runtime Crypter☆240Updated last month
- Golang PE injection on windows☆167Updated 3 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆101Updated 8 months ago
- Fork of pkg/debug that adds some additional functionality.☆123Updated last year
- Injects additional machine instructions into various binary formats.☆277Updated last year
- ☆300Updated last year
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆69Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆183Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆247Updated last year
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- x86 malware emulator☆216Updated 2 weeks ago
- Small tool to run ELF binaries from memory with a given process name☆162Updated 3 years ago
- A command line Windows API tracing tool for Golang binaries.☆156Updated last year
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆373Updated 3 years ago
- bdvl☆113Updated 3 years ago
- Kernel Exploits☆250Updated 3 years ago
- Linux kernel rootkit☆338Updated last month
- LD_PRELOAD rootkit☆131Updated last year
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆226Updated 3 months ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆195Updated 9 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- Slides & Hands-on for the reverse engineering workshop☆178Updated 2 years ago
- Universal Shared Library User-space Loader☆225Updated 2 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆483Updated 4 years ago
- ☆266Updated 2 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆499Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- GhostWriting Injection Technique.☆168Updated 7 years ago
- Shellcode library as a Go package☆70Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆218Updated last year