PLEXSolutions / readhookLinks
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
☆36Updated 6 years ago
Alternatives and similar repositories for readhook
Users that are interested in readhook are comparing it to the libraries listed below
Sorting:
- Rootkit Detector for UNIX☆61Updated last year
- pure Python binary analysis framework☆23Updated 6 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- bunch of random stuff☆21Updated 5 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- A plugin that adds a popup window to Binary Ninja that explains in simple English what an assembly instruction does☆51Updated 4 years ago
- ELF/PE/Mach-O parsing library☆50Updated last year
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 3 years ago
- A way to backdoor every process☆66Updated 7 years ago
- ☆32Updated 11 months ago
- Open Source Rootkit☆22Updated 7 years ago
- Flare-On solutions☆36Updated 5 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Updated 4 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- ☆14Updated 9 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- A VBScript for detecting VirtualBox☆21Updated 9 years ago
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆33Updated 7 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆48Updated 3 months ago
- public bugs/proof of concepts☆48Updated 4 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆59Updated 12 years ago