xforcered / elfpack
ELF Sectional docking payload injector system
☆21Updated 2 years ago
Alternatives and similar repositories for elfpack:
Users that are interested in elfpack are comparing it to the libraries listed below
- ☆22Updated 11 months ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆44Updated last year
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- AMSI detection PoC☆31Updated 5 years ago
- ☆42Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆29Updated 2 years ago
- ☆61Updated 9 months ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- ☆18Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆18Updated last year
- My conference presentations and Materials for them.☆32Updated 2 years ago
- ☆37Updated 2 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- ☆15Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- ☆22Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- ☆30Updated 2 years ago
- Tools that trigger False Positive AV alerts☆48Updated 4 months ago
- Malware Analysis tools☆26Updated 7 months ago