JohnTroony / PE-CodeCavingLinks
Work files for my blog post "Code Caving in a PE file.
☆17Updated 8 years ago
Alternatives and similar repositories for PE-CodeCaving
Users that are interested in PE-CodeCaving are comparing it to the libraries listed below
Sorting:
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 7 months ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- ☆10Updated 6 months ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- A Unix rootkit☆17Updated 4 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆10Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- A script to reverse-engineer anti-virus signatures☆32Updated 12 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆43Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- ☆16Updated 2 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 11 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago