PLEXSolutions / readhook
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
☆35Updated 6 years ago
Alternatives and similar repositories for readhook:
Users that are interested in readhook are comparing it to the libraries listed below
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- Rootkit Detector for UNIX☆62Updated last year
- Copy of the contents at phrack.com☆38Updated 5 months ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆68Updated 7 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- ☆32Updated 8 months ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- bdldr is an unofficial engine loader for Bitdefender ® for Linux☆43Updated 8 years ago
- Source code of https://blahcat.github.io☆13Updated 7 months ago
- A Python tool to generate ROP chains☆60Updated 2 weeks ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- A VBScript for detecting VirtualBox☆20Updated 9 years ago
- Diaphora, a Free and Open Source program diffing tool☆22Updated 5 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- ☆65Updated 8 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- A library for performing memory forensics over the IEEE 1394 interface.☆18Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Open Source Rootkit☆22Updated 7 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago