ulexec / SHELF-LoadingLinks
Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.
☆28Updated 3 years ago
Alternatives and similar repositories for SHELF-Loading
Users that are interested in SHELF-Loading are comparing it to the libraries listed below
Sorting:
- ☆28Updated 6 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- ☆47Updated 3 years ago
- ☆48Updated 5 years ago
- ☆16Updated 4 years ago
- ☆18Updated 5 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆13Updated 2 years ago
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆30Updated 2 years ago
- ☆12Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- ☆20Updated 6 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- Code injection from Linux kernel to a process☆21Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13Updated 3 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 3 years ago
- ☆14Updated 3 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- ☆11Updated 6 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Google Chrome Use After Free☆58Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 8 months ago
- Finds imports that could be exploited, still requires manual analysis.☆28Updated 2 years ago
- ☆19Updated 2 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago