JavaHammes / ZLinks
Z Anti-Anti-Debugger for Linux
☆55Updated 3 months ago
Alternatives and similar repositories for Z
Users that are interested in Z are comparing it to the libraries listed below
Sorting:
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆74Updated this week
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆73Updated 6 months ago
- ☆90Updated 8 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆126Updated 6 months ago
- LLDB based debugger for Linux Kernel☆26Updated 6 months ago
- ntoskrnl.exe and bootmgfw.efi obfuscated with CodeDefender☆45Updated this week
- Reverse Shell - technique is commonly used in cyber attacks☆17Updated last year
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆38Updated 7 months ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆49Updated 5 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆96Updated 5 months ago
- Yandex browser password recovery☆11Updated 6 months ago
- Anti-analysis tool that obfuscates ELF files☆34Updated 4 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 7 months ago
- ☆32Updated 7 months ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆37Updated 8 months ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 6 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆40Updated last year
- Native Rust bindings for @horsicq's Detect-It-Easy☆17Updated 9 months ago
- A high-performance C++ framework for emulating executable binaries☆105Updated 3 weeks ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆83Updated last year
- A curated list of awesome resources related to anti virtualization techniques☆57Updated 3 months ago
- ☆74Updated 11 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- A way to use fonts to obfuscate text.☆46Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆36Updated last month
- A set of LLVM and GCC based plugins that perform code obfuscation.☆132Updated this week
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆175Updated last year
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆119Updated 2 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆64Updated 7 months ago
- ☆154Updated 2 months ago