unmarshal / linux32-syscall-proxy
Execute system calls over the network
☆11Updated 10 years ago
Alternatives and similar repositories for linux32-syscall-proxy:
Users that are interested in linux32-syscall-proxy are comparing it to the libraries listed below
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- ☆14Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆37Updated 9 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- ☆10Updated last month
- Win32 Shellcodes☆9Updated 7 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- ☆20Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Rootkit☆21Updated 10 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 10 years ago
- Application Security library☆11Updated 12 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- A simple exploitable ActiveX control for RE/VR☆18Updated 10 years ago