Barro / self-checksumLinks
A simple program that calculates a checksum over its own executable program memory
☆12Updated 8 years ago
Alternatives and similar repositories for self-checksum
Users that are interested in self-checksum are comparing it to the libraries listed below
Sorting:
- Source code of my KeygenMe V7 challenge☆22Updated 7 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Updated 11 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- Binary matching with Binary Ninja☆22Updated last year
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆35Updated 8 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆33Updated 7 years ago
- Basic BIOS emulator for Unicorn Engine.☆101Updated 4 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- ROP based Movfuscator VM☆28Updated 9 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Web based code browser using clang to provide basic code analysis.☆46Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Updated 7 years ago
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆73Updated 7 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Updated 5 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- ☆35Updated 4 years ago
- ☆28Updated 7 years ago
- Simulate afl-fuzz☆16Updated 6 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Updated 3 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- ☆63Updated 9 years ago