Injects code into ELF executables post-build
☆238Jun 3, 2024Updated last year
Alternatives and similar repositories for drow
Users that are interested in drow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A comprehensive binary emulation and instrumentation platform.☆418Jan 31, 2023Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Malicious use of ELF such as .so inject, func hook and so on.☆78Mar 27, 2017Updated 9 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Apr 8, 2020Updated 5 years ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆209Mar 16, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 8 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A powerful static binary rewriting tool☆1,097Mar 3, 2026Updated 3 weeks ago
- GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE.☆404Jan 18, 2021Updated 5 years ago
- Obfuscate specific windows apis with different apis☆1,023Feb 21, 2021Updated 5 years ago
- Transfer analysis data between Binary Ninja and IDA☆139Oct 16, 2025Updated 5 months ago
- Virtual Machine Introspection, Tracing & Debugging☆597Feb 22, 2022Updated 4 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆820Feb 9, 2025Updated last year
- linux elf injector for x86 x86_64 arm arm64☆346May 31, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Symbolic execution in radare2 with angr☆39Jul 27, 2021Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆184May 2, 2021Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆390Sep 21, 2023Updated 2 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Aug 8, 2017Updated 8 years ago
- Tamper detection in Android☆92Mar 27, 2021Updated 5 years ago
- Linux crash harness with runtime process instrumentation☆22Nov 7, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A collection of LLVM transform and analysis passes to write shellcode in regular C☆381Jun 12, 2023Updated 2 years ago
- Hexrays Toolbox - Find code patterns within the Hexrays ctree☆483Jun 20, 2023Updated 2 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆373Feb 27, 2023Updated 3 years ago
- grap: define and match graph patterns within binaries☆155May 5, 2022Updated 3 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- ☆223Apr 7, 2023Updated 2 years ago
- ☆15May 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Example showing how to use Frida for standalone injection of a custom payload☆164May 26, 2020Updated 5 years ago
- An IDA Python script to extract information from string constants.☆330Updated this week
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,702Mar 19, 2026Updated last week
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- IDA Pro plugin that implements more user-friendly register and stack views☆757Oct 31, 2025Updated 4 months ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- A gdb like debugger that provide a runtime env to unicorn emulator and additionals features!☆193Feb 8, 2023Updated 3 years ago