En14c / PIvirus
sample linux x86_64 ELF virus
☆53Updated 6 years ago
Alternatives and similar repositories for PIvirus:
Users that are interested in PIvirus are comparing it to the libraries listed below
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- ELF packer - x86_64☆72Updated 9 years ago
- ELF/PE/Mach-O parsing library☆50Updated last year
- Obfuscates dynamic symbol table☆134Updated 6 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago
- Resources for reverse engineering Go binaries☆41Updated 10 years ago
- ☆87Updated 8 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆44Updated 6 years ago
- ☆99Updated 6 years ago
- ☆34Updated 9 years ago
- Radare 2 wiki☆92Updated 5 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 6 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 9 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆57Updated 7 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- ☆51Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Rootkit Detector for UNIX☆61Updated last year
- ☆31Updated 7 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 7 months ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago