fexecve harness Logo

fexecve harness

0
Free
Visit Website

These tools execute programs in memory. Programs can be delivered via stdin or from an URL. **From URL:** This will download a file from a host and execute it with arguments. **Using netcat (method1):** This connects to a host on a port to receive the payload. **Using netcat (method2):** This listens for incoming connections on a port to receive the payload.

FEATURES

ALTERNATIVES

A backend agnostic debugger frontend for debugging binaries without source code access.

A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

A tool for testing and exploiting Cross-Site Scripting (XSS) vulnerabilities.

A Burp plugin for identifying potential vulnerabilities in web applications

A payload creation framework for the retrieval and execution of arbitrary CSharp source code.

A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.

A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.

A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.