ELF DSO injector
☆73Jun 23, 2025Updated 8 months ago
Alternatives and similar repositories for injectso
Users that are interested in injectso are comparing it to the libraries listed below
Sorting:
- Stealth's 64bit injectso port☆73Jul 31, 2010Updated 15 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- (ARM Thumb) Re-Assembler utility for reverse engineering☆17May 6, 2018Updated 7 years ago
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- Code injection from Linux kernel to a process☆24May 19, 2023Updated 2 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- 👶🏻😿 A zero-dependency network sniffer, written from scratch, that supports emulated and native cBPF. Runs on Linux, BSD, macOS and Win…☆13Nov 8, 2025Updated 4 months ago
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- ☆23May 11, 2017Updated 8 years ago
- Lightweight Symbolic Execution Engine☆23Jul 1, 2015Updated 10 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- A C polymorphic and metamorphic engine☆74Jan 24, 2019Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 2 months ago
- Automatic ROP chain generator☆12Mar 29, 2015Updated 10 years ago
- simple charting tools for unix.☆28Oct 22, 2015Updated 10 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- Detect some forms of linux kernel tampering☆12Jun 12, 2015Updated 10 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Mar 14, 2018Updated 7 years ago