0xlane / xz-cve-2024-3094Links
XZ Backdoor Extract(Test on Ubuntu 23.10)
☆17Updated last year
Alternatives and similar repositories for xz-cve-2024-3094
Users that are interested in xz-cve-2024-3094 are comparing it to the libraries listed below
Sorting:
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 8 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆43Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- Anti-analysis tool that obfuscates ELF files☆36Updated 4 years ago
- ☆137Updated last year
- Proof of concept & details for CVE-2025-21298☆193Updated last year
- Python tool to resolve all strings in Go binaries obfuscated by garble☆184Updated 11 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- CVE-2023-4911☆16Updated 2 years ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x and 6.x on x86_64, hides files, hides process, hides bind shell & …☆28Updated last week
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)☆18Updated last year
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆142Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated last year
- An automatic Blind ROP exploitation tool☆206Updated 2 years ago
- 📝 Web security related academic papers collection (just for myself).☆25Updated 4 years ago
- ☆17Updated 3 weeks ago
- In-Memory Rootkit For Linux and BSD☆86Updated 5 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 9 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Get root via TTY / TIOCSTI stuffing☆75Updated 8 months ago
- Linpmem is a linux memory acquisition tool☆95Updated 7 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆58Updated 10 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 9 months ago
- ASLR bypass without infoleak☆166Updated 4 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆111Updated 2 months ago