CX330Blake / ZYRALinks
ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.
☆73Updated 6 months ago
Alternatives and similar repositories for ZYRA
Users that are interested in ZYRA are comparing it to the libraries listed below
Sorting:
- This project provides some code examples of Zig for malwares, hacking, and red teaming. ⚡☆194Updated 3 months ago
- Python tool to resolve all strings in Go binaries obfuscated by garble☆188Updated 11 months ago
- Call Stack Spoofing for Rust☆209Updated 2 weeks ago
- Anti-analysis tool that obfuscates ELF files☆36Updated 4 years ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆71Updated last year
- A Windows Named Pipe Multi-tool / Proxy☆287Updated 2 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆138Updated 8 months ago
- Some attempts at using Zig(https://ziglang.org/) in penetration testing.☆255Updated 3 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Updated 5 months ago
- Sleep Obfuscation in Rust☆275Updated 2 months ago
- a tool used to analyze and monitor in named pipes☆193Updated last year
- A simple Meterpreter stager written in Rust.☆45Updated 3 months ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆112Updated 2 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Updated 6 months ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Updated 11 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆75Updated 7 months ago
- Collection of codes focused on Linux rootkits☆197Updated 3 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- Payload encoding utility to effectively lower payload entropy.☆123Updated 9 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆81Updated 2 weeks ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆54Updated 8 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆245Updated 4 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆82Updated last year
- A COFF Loader written in Rust☆135Updated 2 months ago
- dlopen() filelessly a shared object or even a program (and run it).☆56Updated 2 years ago
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆101Updated 2 months ago
- A universal binary patching dll.☆117Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year