whatsbcn / skpdLinks
Process dump to executable ELF for linux
☆105Updated 3 years ago
Alternatives and similar repositories for skpd
Users that are interested in skpd are comparing it to the libraries listed below
Sorting:
- Cross Architecture Shellcode in C☆205Updated 9 years ago
- An ELF parsing and manipulation library for Python☆74Updated 10 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 5 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- ☆27Updated last year
- plugin of ida with pin☆48Updated 4 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Updated 9 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago
- ARM Shellcode Generator☆104Updated 8 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Updated 6 years ago
- ELF packer - x86_64☆73Updated 10 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆136Updated 7 years ago
- IDA PDB Loader☆47Updated 7 years ago
- ELF DSO injector☆67Updated 2 months ago
- IDA Pro plugin making easier work on BinDiff results☆80Updated 9 years ago
- Git copy of idapython svn repo: https://code.google.com/p/idapython/☆49Updated 11 years ago
- A static Internet Explorer Fuzzer.☆50Updated 8 years ago
- ☆99Updated 7 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- integration with IDA☆92Updated 4 years ago
- Obfuscates dynamic symbol table☆134Updated 6 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- ☆89Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- Changing memory protection in an arbitrary process☆47Updated 6 years ago
- Tool to view heap chunks and memory writes (using pintool)☆41Updated 6 years ago
- trace local function calls like strace and ltrace☆70Updated 8 years ago
- LD_PRELOAD hook to trace malloc and free☆45Updated 7 years ago