xforcered / elfpack
ELF Sectional docking payload injector system
☆21Updated 2 years ago
Alternatives and similar repositories for elfpack:
Users that are interested in elfpack are comparing it to the libraries listed below
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- ☆12Updated 3 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- My conference presentations and Materials for them.☆32Updated 2 years ago
- ☆22Updated 10 months ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 10 months ago
- AMSI detection PoC☆31Updated 4 years ago
- ☆61Updated 9 months ago
- ☆27Updated 5 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆43Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Lazarus analysis tools and research report☆56Updated last year
- Tools that trigger False Positive AV alerts☆44Updated 3 months ago
- A collection of shellcode hashes☆17Updated 6 years ago
- ☆76Updated last month
- Exfiltration based on custom X509 certificates☆26Updated last year
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆67Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆45Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- ☆37Updated 2 years ago
- ☆42Updated 2 years ago