ulexec / SHELF-LoadingLinks
Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.
☆28Updated 4 years ago
Alternatives and similar repositories for SHELF-Loading
Users that are interested in SHELF-Loading are comparing it to the libraries listed below
Sorting:
- ☆28Updated 6 years ago
- ☆48Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- ☆18Updated 5 years ago
- ☆48Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- ☆13Updated 2 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- ☆16Updated 4 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 4 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆14Updated 3 years ago
- ☆29Updated 3 weeks ago
- ☆12Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Matryoshka - stacked LKM loader☆53Updated last year
- ☆31Updated 4 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- yet another hidden LKM hunter☆27Updated 2 weeks ago
- PoC of macho loading from memory☆57Updated 10 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 2 years ago
- Scripts from Ghidra Golf competitions☆34Updated 2 years ago
- A collection of various exploits☆29Updated last year
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago