A library for loading ELF from memory and/or making Linux syscalls on Android written in pure Java.
-
Updated
Mar 31, 2025 - Java
A library for loading ELF from memory and/or making Linux syscalls on Android written in pure Java.
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing.
Advanced Windows shellcode development framework with position-independent code generation, dynamic API resolution, and cross-architecture support for security research and penetration testing.
🔐 Load and execute XOR-encrypted shellcode on Windows with this efficient C++ and Python utility for enhanced security and customization.
In-memory loading and executing Mach-O executable.
Package gimel provides functionality for in-memory execution on Linux.
Research proof-of-concept repository for ELF executable embedding, in-memory execution, and obfuscation techniques
This package implements a basic PE loader in python to load executable in memory (used to create packer, loader from internet or to impact a process context).
Linux In-Memory ELF Loader -- Execute binaries from memory via memfd_create, /proc/self/mem, shm_open. Zero disk artifacts. Bash + Python.
Small Rust toolkit for pulling shellcode out of a Windows PE and (optionally) executing it in-memory for quick validation.
Advanced memory evasion PoC that cyclically encrypts shellcode and fluctuates between RW/NoAccess and RX memory protections to bypass memory scanners like Moneta and PE-Sieve.
🚀 Load and execute Mach-O executables in memory with this reflective loader, providing a unique alternative to execve for macOS command-line programs.
Add a description, image, and links to the in-memory-execution topic page so that developers can more easily learn about it.
To associate your repository with the in-memory-execution topic, visit your repo's landing page and select "manage topics."