whatsbcn / skpdLinks
Process dump to executable ELF for linux
☆105Updated 3 years ago
Alternatives and similar repositories for skpd
Users that are interested in skpd are comparing it to the libraries listed below
Sorting:
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆53Updated 9 years ago
- ELF Unstrip Tool☆105Updated 9 years ago
- ELF packer - x86_64☆72Updated 9 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- plugin of ida with pin☆48Updated 4 years ago
- ☆56Updated 8 years ago
- ELF obfuscator☆67Updated 9 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Updated 6 years ago
- Inject code to process memory, link it and run in a separate thread (ARM/AARCH64 only).☆46Updated 7 years ago
- ☆27Updated last year
- Chakra vulnerability and exploit bypass all system mitigation☆83Updated 6 years ago
- An ELF parsing and manipulation library for Python☆74Updated 10 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 9 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Updated 12 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆135Updated 7 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- ARM Shellcode Generator☆104Updated 7 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆87Updated 8 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- ☆26Updated 8 years ago
- A static Internet Explorer Fuzzer.☆50Updated 7 years ago
- ☆87Updated 10 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago