scumjr / idontgiveashellLinks
Load a .so from network and execute it inside a seccomp sandbox
☆19Updated 10 years ago
Alternatives and similar repositories for idontgiveashell
Users that are interested in idontgiveashell are comparing it to the libraries listed below
Sorting:
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- go reversing helpers for binaryninja☆29Updated 2 years ago
- Symbol REPL☆31Updated 7 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Yet another IDA Pro real time syncing plugin☆16Updated 7 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 4 years ago
- Miscellaneous IDA scripts and projects☆14Updated 4 years ago
- Rust binding for Keystone assembler framework☆11Updated 6 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Anything related to Ghidra☆12Updated 6 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- WinAppDbg helper script to catch API calls☆12Updated 12 years ago
- ELF DSO injector☆67Updated 2 months ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- implementation of some concepts in Security and Exploiting☆13Updated 10 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆10Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Application Security library☆11Updated 12 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago