unmarshal / linux32-syscall-proxyLinks
Execute system calls over the network
☆11Updated 10 years ago
Alternatives and similar repositories for linux32-syscall-proxy
Users that are interested in linux32-syscall-proxy are comparing it to the libraries listed below
Sorting:
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Inject shellcode into running processes in Linux.☆44Updated last year
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- CTF & practice exploit collection☆38Updated 8 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- ☆38Updated 9 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated 2 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- Stealth's 64bit injectso port☆73Updated 15 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆134Updated 7 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆35Updated 5 years ago
- Copy of the contents at phrack.com☆40Updated 4 months ago
- ☆36Updated 12 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- Format string exploitation helper☆45Updated 9 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Linux Runtime Process Injection Tool☆61Updated 12 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago