PLEXSolutions / readhook
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
☆36Updated 6 years ago
Alternatives and similar repositories for readhook:
Users that are interested in readhook are comparing it to the libraries listed below
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆57Updated 7 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Demo bootloaders - created just for fun☆22Updated 7 years ago
- ELF/PE/Mach-O parsing library☆50Updated last year
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- ☆65Updated 8 years ago
- Vagrant setup for building a machine for CTF/exploit development☆22Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- Python module to detect, analyze and id application bugs☆21Updated last month
- Copy of the contents at phrack.com☆38Updated last month
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- ☆32Updated 10 months ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- ☆42Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆90Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆32Updated 7 years ago
- ☆50Updated 12 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- ELF Infector's Toolkit☆64Updated 8 years ago
- Simple reporting plugin for binary ninja☆16Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Open Source Rootkit☆22Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago