Electronic Souls
Tool for infecting statically linked ELF binaries.
8be869de86b6690ac0687ffc6128d8d400109360e4e989b834b8e9a671d893d0
White paper discussing a method of infecting statically linked ELF binaries.
b1706a6a89aa5acf716ceada0b5da3383eeea00193479d24b7d0255abcd2e533
Exorcist is a tool that can be considered an anti-anti-ptrace utility that unlocks the ptrace_traceme guard of a binary.
196afaa678e5a8451af6b0aeebe04c81eb9e6697dad1f3fcd75c7fa9ed883329
Silencer holds three different functionalities. It will deploy a backdoor in a listening service that an attacker must connect to, feed the magic word, and then portscan the machine to find the bindshell spawned, it has an Apache backdoor that allows a connection over HTTP to drop to a shell, and it also has a read sniffer built in that goes through the kernel read() process and then logs it to /tmp/.es.rox. The authors ask to be contacted if anyone finds any systems or kernels that this does not work on.
41eb4095cd39cb456d3f839ae2f1d1ccad55ea5d5d7cc64453d8653a4a0b9510
(N)compress 4.2.4 local root exploit.
8ad5fecf9ab689d4c57252919836ecd38d23f16efdaea8755879e04bdd2451c3
Flooding and sniffing robot for the IRC that attacks with spoof IGMP packets.
c9511dfcec990896079ce0509d8e7a92f5cf2d5ffb168064ff03db42d335fcdc
Full low level (without libc) AT+T port scanner written for the article "Advanced AT+T asm tutorial. Part 1".
b351a9da40051ae17249d3db2ddf289d051cdd7d92fc3d6c2836ab9d5b54a53d
Demo Permutate Engine for Linux that supports a few permutatable instructions: xor,sub,test,or,mov.
be15fb2bca26a61637e15f8fde38dd123b6a33c3b416fc9a541a0d9f8ac3d003
0x4553_Executor is a memory executor that allows a user to load code from file to memory and execute it.
ee6f412dcf6e5016ccb3bd30d093edd27679edf336bc268f7b36e79104c28552
0x4553_Crypt0r is a base engine for encrypting ELF binaries. Uses simple bit rotation and allows for the ability to add your own algorithm.
36f1bbb88e87fdfc2043f0e77d68dc9bb9e22057400152254667ed960fdbad93
This utility will search in a binary or core dump for a user supplied string and return the exact location in memory.
04004d4e5e5743978d087451e5eb2c0f3d8e7662be4e402f57cebb2c01305e4d
This ELF infector appends two executables together. The payload inside this parasite opens a bind shell on the infected machine as the user who executed it.
f4f9282628fac3918df1ccfb4c92839b7ee9fbfe284516b282d78e48ae663acb
This utility is a basic terminal sniffer.
342b6b2e3101a53ec1e745340e78e6782a5ce0141ba04347c60ffadf34173299
Exploit for NetMerchant that allows for remote command execution.
e30fda7b60a08dc3612148a6ccee162a260d3ab4e8710e2ff20fee58a2b5224d
Graphic for Electronic Souls
010d7326457ef6e0d616c7acb7e3eaa404e1bac1bd4422d5b341e068bc4a31d8