Injects code into ELF executables post-build
☆237Jun 3, 2024Updated last year
Alternatives and similar repositories for drow
Users that are interested in drow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A comprehensive binary emulation and instrumentation platform.☆418Jan 31, 2023Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Malicious use of ELF such as .so inject, func hook and so on.☆78Mar 27, 2017Updated 9 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Apr 8, 2020Updated 6 years ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆210Apr 6, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 8 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A powerful static binary rewriting tool☆1,101Mar 3, 2026Updated last month
- GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE.☆402Jan 18, 2021Updated 5 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- Transfer analysis data between Binary Ninja and IDA☆140Oct 16, 2025Updated 6 months ago
- An IDA processor for eBPF bytecode☆52Oct 13, 2021Updated 4 years ago
- Virtual Machine Introspection, Tracing & Debugging☆596Feb 22, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆821Feb 9, 2025Updated last year
- linux elf injector for x86 x86_64 arm arm64☆348May 31, 2018Updated 7 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Symbolic execution in radare2 with angr☆39Jul 27, 2021Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆185May 2, 2021Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 6 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆391Sep 21, 2023Updated 2 years ago
- add symbols back into a stripped ELF binary (~strip)☆176Aug 8, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tamper detection in Android☆92Mar 27, 2021Updated 5 years ago
- Linux crash harness with runtime process instrumentation☆22Nov 7, 2020Updated 5 years ago
- A collection of LLVM transform and analysis passes to write shellcode in regular C☆382Jun 12, 2023Updated 2 years ago
- Hexrays Toolbox - Find code patterns within the Hexrays ctree☆483Jun 20, 2023Updated 2 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Nov 26, 2020Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- grap: define and match graph patterns within binaries☆155May 5, 2022Updated 3 years ago
- ☆224Apr 7, 2023Updated 3 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆372Feb 27, 2023Updated 3 years ago
- ☆15May 11, 2023Updated 2 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆165May 26, 2020Updated 5 years ago
- An IDA Python script to extract information from string constants.☆330Mar 24, 2026Updated 3 weeks ago
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,714Apr 6, 2026Updated last week
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- IDA Pro plugin that implements more user-friendly register and stack views☆763Oct 31, 2025Updated 5 months ago