The first Linux hooking framework to allow merging two binary files into one!
☆97May 18, 2025Updated 10 months ago
Alternatives and similar repositories for GLORYHook
Users that are interested in GLORYHook are comparing it to the libraries listed below
Sorting:
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- GoLang binary pclntab mangler☆14Mar 2, 2020Updated 6 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Aug 27, 2020Updated 5 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Aug 17, 2022Updated 3 years ago
- sample linux x86_64 ELF virus☆54Jun 25, 2018Updated 7 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆58Mar 13, 2020Updated 6 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆55Aug 26, 2022Updated 3 years ago
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- ☆22Jul 27, 2020Updated 5 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆113Apr 20, 2021Updated 4 years ago
- A fast execution trace symbolizer for Windows.☆130May 6, 2024Updated last year
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- ☆60Mar 28, 2020Updated 5 years ago
- PoC of macho loading from memory☆58Nov 18, 2024Updated last year
- xnu-10.10 mach-o loader that compiles in userland☆19Aug 5, 2015Updated 10 years ago
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- Collection of VBA macro published in our twitter / blog☆157Sep 5, 2022Updated 3 years ago
- sploit☆67Dec 21, 2019Updated 6 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago