Papa Shango is a Linux process injection tool that uses ptrace() to inject shellcode into a running process. It allows you to write your payloads in assembler and does not care about NULL bytes. Here is an example of how to use it: `cat papa-shango shellcode > payload chmod +x payload ./payload <pid>`
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A minimal, consistent API for building integrations with malware sandboxes
A collection of Yara rules for identifying malicious PEs with unique or suspicious PDB paths.
Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.
RetDec is a versatile machine-code decompiler with support for various file formats and architectures.
A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds
Interactive malware hunting service with live access to the heart of an incident.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
A collection of publicly available YARA rules for detecting and classifying malware.
Identifies 137 malicious npm packages and gathers system information to a remote server.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.