xforcered / elfpack
ELF Sectional docking payload injector system
☆21Updated 2 years ago
Alternatives and similar repositories for elfpack:
Users that are interested in elfpack are comparing it to the libraries listed below
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆43Updated last year
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- ☆61Updated 8 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- AMSI detection PoC☆31Updated 4 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- ☆42Updated 2 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Malware Analysis tools☆25Updated 5 months ago
- ☆72Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 4 years ago
- ☆24Updated 4 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 9 months ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- ☆55Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- ☆38Updated 2 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- ☆16Updated 3 years ago
- Dump objects from .NET dumps.☆50Updated 2 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Specialized tool to dump Position Independent Code.☆21Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 4 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago