JavaHammes / ZLinks
Z Anti-Anti-Debugger for Linux
☆59Updated 5 months ago
Alternatives and similar repositories for Z
Users that are interested in Z are comparing it to the libraries listed below
Sorting:
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆72Updated 8 months ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆51Updated 7 months ago
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆89Updated last week
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 9 months ago
- Native Rust bindings for @horsicq's Detect-It-Easy☆18Updated last month
- ☆89Updated 10 months ago
- MCP for reverse engineering☆46Updated 9 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆132Updated 8 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆73Updated 9 months ago
- Yandex browser password recovery☆11Updated 8 months ago
- WinDbg-ext-MCP bridges your favorite LLM client (like Cursor, Claude, or VS Code) with WinDbg, enabling real-time, AI assisted kernel deb…☆50Updated 3 months ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆110Updated 2 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆112Updated 2 weeks ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆41Updated 2 years ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆136Updated 2 months ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 8 months ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆232Updated 2 months ago
- LLDB based debugger for Linux Kernel☆27Updated 8 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆89Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 5 months ago
- x86/x64 Ring 0/-2 System Freezer/Debugger☆120Updated 7 months ago
- minimal hypervisor for aarch64 (WIP)☆29Updated last month
- Reverse Shell - technique is commonly used in cyber attacks☆19Updated last year
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆39Updated 11 months ago
- ☆31Updated 10 months ago
- monitors hidden syscalls called from call of duty anticheat☆87Updated 11 months ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆42Updated 9 months ago
- Generate backdoored RSA keys using SETUP☆225Updated last month
- A Rust crate for parsing Windows user minidumps.☆41Updated last year
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆21Updated last year