CX330Blake / ZYRALinks
ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.
☆54Updated 2 weeks ago
Alternatives and similar repositories for ZYRA
Users that are interested in ZYRA are comparing it to the libraries listed below
Sorting:
- Python tool to resolve all strings in Go binaries obfuscated by garble☆117Updated 6 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆119Updated 4 months ago
- This project provides some code examples of Zig for malwares, hacking, and red teaming. ⚡☆153Updated 3 weeks ago
- Some attempts at using Zig(https://ziglang.org/) in penetration testing.☆247Updated last year
- Call Stack Spoofing for Rust☆187Updated last month
- A simple Meterpreter stager written in Rust.☆40Updated 11 months ago
- Binary Exploitation Phrack CTF Challenge☆85Updated this week
- ☆108Updated 9 months ago
- A Payload Analysis Framework☆83Updated last month
- bootlicker: A terribly written but functioning UEFI shellcode bootkit patched into a firmware volume or boot device on the EFI partition☆33Updated 6 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆100Updated last month
- Memory Obfuscation in Rust☆249Updated last month
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆67Updated 7 months ago
- Monarch - The Adversary Emulation Toolkit☆63Updated 7 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆68Updated this week
- Payload encoding utility to effectively lower payload entropy.☆119Updated 4 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆55Updated 5 months ago
- macos stealer poc☆121Updated last month
- ☆37Updated 8 months ago
- Make your programs stealthier🐝☆177Updated 2 months ago
- Collection of codes focused on Linux rootkits☆148Updated last week
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆108Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆82Updated 6 months ago
- UAC Bypass using CMSTP in Rust☆30Updated 8 months ago
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆99Updated 2 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆65Updated 2 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆14Updated 6 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆225Updated last month
- In-Memory Rootkit For Linux and BSD☆76Updated 2 weeks ago