PLEXSolutions / readhookLinks
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
☆36Updated 6 years ago
Alternatives and similar repositories for readhook
Users that are interested in readhook are comparing it to the libraries listed below
Sorting:
- Rootkit Detector for UNIX☆61Updated last year
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆57Updated 7 years ago
- ☆65Updated 8 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆60Updated 10 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- A way to backdoor every process☆66Updated 7 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Demo bootloaders - created just for fun☆22Updated 7 years ago
- ☆32Updated last year
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ☆42Updated 6 years ago
- ☆43Updated 5 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 6 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago